Console terminology: In the Maverics Console, the combination of applications,
policies, headers, and connector bindings is managed through User Flows. In
YAML, these elements are configured directly within each app’s configuration block
under
apps[].policies[].App Types
The AI Identity Gateway provides two app types, each designed for a different deployment pattern. Both share provider-level settings for transports and OAuth authorization to authenticate inbound agent connections.MCP Bridge App
Translate REST APIs into MCP tools — reads OpenAPI specs and generates an MCP tool catalog with delegated authorization
MCP Proxy App
Proxy MCP traffic to upstream MCP servers with identity injection, per-tool authorization, and delegation token exchange
Agent Identity
AI agents present unique identity challenges that traditional user authentication does not address. When an agent calls an MCP tool on behalf of a user, the system must track both the agent’s identity and the delegated user identity — ensuring that the agent can only access resources the user has authorized. The AI Identity Gateway propagates identity context through the entire agent-to-tool chain:- Agent authentication — Verify the identity of the AI agent itself before allowing any tool access
- User delegation — Carry the delegating user’s identity and permissions through agent tool calls
- Scope enforcement — Restrict agent actions to the specific permissions the user has granted
- Audit trail — Log both agent and user identity for every tool invocation, enabling compliance and forensics
How It Works
The AI Identity Gateway processes agent requests through a layered pipeline that validates identity, enforces authorization, and preserves audit context at every step:- Agent connection — An AI agent connects to the AI Identity Gateway Orchestrator’s MCP endpoint via SSE or Streamable HTTP transport.
- OAuth discovery — The gateway returns protected resource metadata (RFC 9470) via
/.well-known/oauth-protected-resource, which lists the Auth Provider Orchestrator (or other authorization servers) the agent can authenticate against. - Agent authentication — The agent authenticates against the Auth Provider Orchestrator and obtains an access token. The agent presents this token to the AI Identity Gateway Orchestrator.
- Token validation — The AI Identity Gateway Orchestrator validates the agent’s token against the configured authorization server. The token identifies both the agent and the delegating user.
- Tool discovery — The agent requests available tools. For MCP Bridge apps, tools are generated from OpenAPI specs. For MCP Proxy apps, tools are discovered from upstream MCP servers. Tools from multiple apps can be namespaced to avoid naming conflicts.
- Tool invocation with authorization — When the agent invokes a tool, the AI Identity Gateway Orchestrator evaluates OPA policies on the inbound request, performs token exchange via the Auth Provider Orchestrator to obtain a scoped delegation token, and forwards the request to the upstream service.
- Response and audit — The upstream response flows back through the Orchestrator to the agent, with full audit logging capturing the agent identity, delegating user identity, tool name, and outcome.
Key Concepts
Two-Deployment Architecture
The AI Identity Gateway involves two orchestrator roles that are typically (but not necessarily) separate deployments:- Auth Provider Orchestrator — Runs the OIDC Provider with OIDC apps. Acts as the OAuth authorization server. Handles agent authentication, token issuance, and token exchange (minting short-lived, scoped delegation tokens for each tool invocation).
- AI Identity Gateway Orchestrator — Runs the MCP Provider with MCP Bridge and MCP Proxy apps. Handles MCP transport, tool routing, inbound authorization (OPA policies), and upstream forwarding.
MCP (Model Context Protocol)
MCP is an open protocol for AI agents to discover and invoke tools. The AI Identity Gateway adds identity and authorization to MCP, which the protocol does not natively provide. The Orchestrator acts as an MCP server to agents while acting as an MCP client (or REST client) to upstream services.Provider-Level vs App-Level
Provider-level settings are shared across all MCP apps: inbound transports (how agents connect) and OAuth authorization (how agent tokens are validated). Individual MCP Bridge and MCP Proxy apps configure their own upstream connections, tool catalogs, and per-tool authorization. This separation means all MCP apps on one Orchestrator share the same inbound endpoint.Delegation vs Impersonation
Token exchange supports two modes. Delegation (default) produces tokens with anact claim showing both user and agent identity — ideal for auditability. Impersonation produces tokens that fully assume the user’s identity with no trace of the agent — needed when upstream services don’t understand the act claim.
Per-Tool Authorization
Each tool can have its own OAuth scopes and token TTL, enabling least-privilege access. A read-only tool gets narrow scopes; a write tool gets broader scopes. Tool names support exact matching and regex patterns for wildcarding.Inbound vs Outbound
This is the critical architectural distinction. Inbound configuration (transports, OAuth) controls how agents connect TO the Orchestrator. Outbound configuration (upstream, token exchange) controls how the Orchestrator connects to backend services. They are independently configured.Setup
- Console UI
- Configuration
In the Maverics Console, MCP Provider settings are configured in the Deployment Settings dialog under the MCP Provider section.General
Agent Connection and Session ManagementTransports (HTTP Stream):
Session:
OAuth 2.0 Authorization Settings
| Field | Required | Description |
|---|---|---|
| Enabled | Yes | Toggle to enable the MCP Provider. On by default. |
| Server Name | No | MCP server name for identification. Defaults to “Maverics AI Identity Gateway”. |
| Field | Required | Description |
|---|---|---|
| Stream Endpoint | Yes | URL path where agents connect via Streamable HTTP (e.g., /mcp). |
| Field | Required | Description |
|---|---|---|
| Header Name | No | HTTP header used for session IDs. Default: Mcp-Session-Id. |
| Session Timeout | Yes | Duration before idle sessions expire. Default: 1 hour. |
| Allow Client Termination | No | Toggle to allow clients to terminate their own sessions. On by default. |
| Field | Required | Description |
|---|---|---|
| Enable OAuth Authorization | No | Toggle to enable OAuth authorization for inbound MCP connections. Off by default. |
The Console UI provides a subset of the full YAML configuration. SSE transport configuration, keep-alive settings, OAuth server details (well-known endpoint, token validation method, expected audiences), and metadata refresh intervals are only available in YAML. See the Configuration tab for the complete reference.
Related Integrations
The AI Identity Gateway uses Identity Fabric connectors on the Auth Provider Orchestrator (not on the gateway itself) to authenticate agents and issue tokens. The connector configuration for agent authentication lives on the Auth Provider’s OIDC Provider deployment. These are the most commonly used connectors for agent identity:Microsoft Entra ID
Microsoft Entra ID for agent authentication
Okta
Okta for agent authentication
Auth0
Auth0 for agent authentication
Generic OIDC
Any OIDC provider for agent authentication
Related Pages
MCP Bridge App
Full configuration reference, Console UI setup, and troubleshooting for MCP Bridge apps
MCP Proxy App
Full configuration reference, Console UI setup, and troubleshooting for MCP Proxy apps
OIDC Provider
Configure the Auth Provider Orchestrator for token issuance and exchange
Applications
Overview of all application types and how they fit into a deployment