Skip to content
On-demand recording | SAP IdM End of Life: Migration Without Disruption | With Deloitte · 60 min Watch recording
SOLUTION

Agent‑Safe Tools

Verified agents Constrained tools Auditable calls
Visual representation of agent-safe tools with Gateway and Shield enforcement layers

How it works

  1. Agent presents ARIA Passport to Gateway.
  2. Gateway validates and checks policy for the requested tool.
  3. Constraints and obligations enforced; tool is invoked.
  4. Receipt is created with full context.

What the PDP returns for an agent tool call

When an agent calls tools/invoke, the PDP checks delegation, verifies the tool is in the agent's capability list, and returns a permit with agent-specific constraints and obligations stacked on the decision:

Constraints returned

  • Model allowlist (e.g., gpt-4o-mini only)
  • Token / output cap
  • Egress allowlist (approved API hosts)
  • Spend budget (daily/monthly per-model)
  • Data scope (delegating user's ABAC scope)

Obligations returned

  • audit_log — full decision context
  • rate_limit — per-agent velocity
  • Signed receipt emission
  • Notification on high-risk permits

Same PDP, same AuthZEN wire format. Agent path requires delegation_id + tool in delegation_capabilities. Human path requires only PermissionGrant. Both get constraints. Authorization engine →

FAQ

  • How do schema pins work? Gateway validates tool/model schema hash/version and blocks drift pre‑exec.
  • Can we restrict tools per agent? Yes. AuthZEN constraints and allow‑lists per agent/role.
  • Do we get receipts? Every governed call emits a signed receipt for audit and chargeback.

Related comparisons

Watch: Tool Governance in 90 seconds

Standards

  • OpenID AuthZEN obligations/constraints
  • RAR (RFC 9396), DPoP (RFC 9449)
  • MCP model/tool schema pins

Learn more

Technical docs

Gateway Docs

Related reading

MCP PrimerPDP Reference