Authentication

Connect your identity provider to authenticate users and AI agents.

Human Identity👤

Integrate with Active Directory, Okta, AWS IAM, GCP Cloud Identity, Azure Entra ID, LDAP, and other identity providers. Works on desktop and web apps.

Non-Human Identityâ˜ī¸

Support AI agent authentication with tokens, X.509 certificates (mTLS), and custom methods.

Enterprise Security🔐

Single sign-on (SSO), group policies, and automated provisioning.

Authorization

Control what AI can access with granular policies. From simple rules to rich custom logic.

Tool Signatures

Verify the integrity and authenticity of AI tools before allowing access to your systems. Cryptographic signatures ensure that only approved, unmodified tools can interact with your data.

Support for multiple verification methods including code signing, hash validation, and custom attestation schemes to maintain a secure AI ecosystem.

Tool Signature Verification Process

Access Control

Authorization policies built for AI interactions. Control access to any system or service while providing rich, contextual responses that help LLMs understand permissions and alternatives.

Before

User
Purchase 10 shares of AAPL for account 5678
AI Assistant

Trade executed successfully

Purchased 10 shares of AAPL (Apple Inc.) for account 5678 at market price $185.42. Total cost: $1,854.20. Order ID: TXN-789012345

Unauthorized account access

After

User
Purchase 10 shares of AAPL for account 5678
AI Assistant

Trade Rejected

Your request to purchase stocks for account 5678 has been blocked by security policies.

You can only trade in account 1234. Please update your request with the correct account number.

User permissions enforced

Flexible Policy

Create expressive policies and assign them to groups or individual users to meet your organization's needs.

Target MCP servers, methods, functions, and arguments. Use webhooks to delegate decisions to external systems and third-party CSPM/DSPM solutions, or write fully customizable Lua scripts for advanced logic.

-- Joe the intern lost his laptop on the train today
function handler(input)
    if input.Context.Subject == "joe" and
       input.Context.MCPServerName == "stocks" then
        return {
            Decision = "deny",
            Details = "Laptop lost, temporary block"
        }
    else
        return {
            Decision = "defer"
        }
    end
end
POST https://policy.example.com/authorization/check

{
    "type": "request",
    "mcp_server_name": "stocks",
    "mcp_method": "tools/call",
    "subject": "alice",
    "function": "purchase_stock",
    "arguments": {
        "ticker": "TSLA",
        "quantity": "100"
    },
    "body_bytes": "eyJpZCI6MSwibWV0aG9kIjoid..."
}
|

Human-in-the-Loop

Introduce human oversight of AI actions to reduce risk and increase accountability

Approval Workflows

Bring human decisions into your AI systems and tools. Set approval requirements for high-risk or sensitive operations, and route requests to the right people.

Send approval requests to individual users, groups, or escalation hierarchies. Approve via the web interface, Slack, email, or custom integrations.

#
ai-approvals
đŸ‘Ĩ 12
🔍
â„šī¸
🤖
Tyranno Bot APP 2:31 PM
Approval Required
Alice wants to transfer $100 from account 1234 to account 5678
📎
😊
@
📤

Data Protection

Detect and protect sensitive information in AI interactions. Alert, redact, tokenize, or filter data to prevent leaks, ensure compliance, and maintain privacy.

Redact Sensitive Information

Mask confidential data while maintaining document structure and analytical value.

Before

User
Show me the latest technical support requests
AI Assistant

Here are the recent support tickets:

  • Ticket #2847: "Can't access my account, please get back to me at 555-987-6543"
  • Ticket #2848: "Please update my credit card to 1234-5678-9012-3456"
  • Ticket #2849: "My account has the wrong SSN, it currently says 123-45-6789 but should be 987-65-4321"
Confidential data exposed

After

User
Show me the latest technical support requests
AI Assistant

Here are the recent support tickets:

  • Ticket #2847: "Can't access my account, please get back to me at [Redacted:Phone]"
  • Ticket #2848: "Please update my credit card to [Redacted:Credit Card]"
  • Ticket #2849: "My account has the wrong SSN, it currently says [Redacted:SSN] but should be [Redacted:SSN]"
Confidential data redacted

Tokenize Personally Identifiable Information (PII)

Replace identifiable data with reversible tokens for research and analysis. Available per-session, per-user, per-group, or organization-wide.

Before

User
Summarize last week's medical visits
AI Assistant

Medical Visit Summary (Week of Aug 5-11, 2025):

  • Annual Physicals: Sarah Chen, Michael Rodriguez, Jennifer Wang
  • Dermatology: Sarah Chen, David Thompson
  • Prescription Refills: Michael Rodriguez, Lisa Anderson, Jennifer Wang
  • Dental Checkups: David Thompson, Lisa Anderson
Personal data exposed

After

User
Summarize last week's medical visits
AI Assistant

Medical Visit Summary (Week of Aug 5-11, 2025):

  • Annual Physicals: a7b9c2, d3e4f6, m8n9o1
  • Dermatology: a7b9c2, p2q3r4
  • Prescription Refills: d3e4f6, s5t6u7, m8n9o1
  • Dental Checkups: p2q3r4, s5t6u7
Personal data tokenized

Block Access to Privileged Information

Completely deny retrieval of critical data. Customize responses to LLMs and users.

Before

User
Who are the three highest-paid employees?
AI Assistant

Here are the three highest-paid employees:

  • 1. Sarah Chen - Chief Technology Officer - $285,000 annually
  • 2. Michael Rodriguez - VP of Sales - $270,000 annually
  • 3. Jennifer Wang - Head of Engineering - $245,000 annually
Sensitive information leaked

After

User
Who are the three highest-paid employees?
AI Assistant

I cannot provide individual employee salary information as this contains sensitive HR data that is restricted based on current access policies.

Contact the CISO office if you need access to compensation analytics or have questions about HR data access permissions.

Sensitive information access blocked

Network Isolation

Isolate AI systems in secure network environments. Control all inbound and outbound traffic to prevent data exfiltration and credential theft.

Secure Traffic and Boundaries

All traffic flows through the firewall using TLS encryption, with attestation available for confidential compute deployments. Inbound and outbound connections are subject to policy to ensure complete control over data access and prevent unauthorized exfiltration.

Network Isolation Architecture

Auditing and Observability

Complete visibility into AI activity with detailed logging and request tracing. Export to your monitoring tools for centralized analysis and alerting.

Comprehensive Logs

Structured logging captures every interaction, security event, and activity with complete request tracing across multiple components. Integrate with Splunk, Datadog, Elasticsearch, and other services, or custom endpoints.

level=INFO msg="MCP method invoked" mcp_server=emails user=alice method=send_email function=compose args_count=4
level=INFO msg="Authentication successful" mcp_server=database user=bob group_count=2 auth_method=oidc
level=ALERT msg="PII data detected in response from MCP server" mcp_server=customer_db user=charlie data_types="email,ssn" response_size=2847
level=INFO msg="Authorization policy applied" mcp_server=trading user=diana policy=account_restrictions action=allowed
level=ERROR msg="MCP response timeout" mcp_server=analytics user=eve timeout=30s retry_count=2
level=ALERT msg="Unauthorized access attempt blocked" mcp_server=payroll user=frank reason="insufficient_permissions" group_required=hr
level=INFO msg="Data redaction applied" mcp_server=crm user=grace redactions="credit_card,ssn" original_size=1847 redacted_size=1203
level=INFO msg="Human approval requested" mcp_server=payments user=henry approval_type=transaction amount=50000 approver=cfo
level=ERROR msg="Network isolation violation detected" mcp_server=stocks user=ivan blocked_destination="external.api.com" policy=network_restrictions
level=INFO msg="Token substitution performed" mcp_server=research user=jane tokens_created=12 session_scope=user encryption=aes256
level=ALERT msg="Anomalous access pattern detected" user=kelly pattern="unusual_hours,multiple_servers" risk_score=85 action=monitor
level=INFO msg="Remote attestation verified" mcp_server=confidential user=lisa attestation_type=sgx measurement_hash="a7b8c9d0e1f2" status=valid

Tamper-Proof Deployments

Verify hardware-backed attestations to connect only to authentic, unmodified servers.

Software and Configuration Integrity

Built for handling your most sensitive data or accessing critical systems. Clients cryptographically verify server integrity before connecting to ensure they interact with a trusted runtime environment.

Available in confidential compute deployments, servers generate attestations of their software and configuration state. These are signed with a hardware-rooted chain of trust. Clients decide which combinations are acceptable.

Remote Attestation Process