Introduction
About 2 min
What is Datawiza Agent Gateway?
Datawiza Agent Gateway is the inline enforcement layer for AI agents. It gives enterprises one place to control access, broker credentials, and audit agent activity across MCP servers, APIs, SaaS apps, and internal tools.
What can I do with Datawiza Agent Gateway?
- Control what each agent can do at the tool, action, endpoint, or resource level. Allow what is needed. Deny the rest by default.
- The gateway handles downstream authentication on the agent’s behalf — including federated token exchange, OAuth token management, and vaulted credentials for legacy systems. Agents never hold secrets.
- Evaluate access using both agent identity and real user identity from Entra ID, Okta, AWS, or any OIDC/SAML provider.
- Route agent-to-tool traffic through one enforcement layer instead of relying on each MCP server, API, or SaaS connector to implement security differently.
- Require stronger controls for sensitive actions such as bulk exports, destructive updates, or high-risk workflows.
- Capture a complete record of each agent interaction: who initiated it, what was attempted, what policy applied, and what happened next.
What are the benefits of Datawiza Agent Gateway?
- Control access. Decide which agents can reach which tools, APIs, and resources — based on the real user, the agent, the action, and the environment.
- Broker credentials. Exchange or inject the right downstream credential at runtime, so agents never hold API keys, OAuth tokens, or service credentials directly.
- Audit every action. Record who initiated the action, which policy applied, what the agent attempted, and whether it was allowed, denied, or routed for approval.
How it works
In common proxy-based deployments, the main change is routing agent traffic through the Datawiza Agent Gateway instead of directly to the target tool or system.
- Agents connect through Datawiza: AI agents, copilots, assistants, and agent frameworks send requests through Agent Gateway rather than connecting directly to tools and systems. One configuration change — replace the direct endpoint URL with the Datawiza gateway URL. No SDK, no code changes to the agent or the downstream system.
- Identity and context are established: Each request is tied to relevant context: agent identity, end-user identity (from your enterprise IdP — Entra ID, AWS IAM, Okta, or any identity provider), team or application context, target system, environment, and requested action. The gateway knows not just what is being called, but who is calling it and why.
- Policy is evaluated in real time: Datawiza checks whether the request should be allowed, denied, constrained, or routed for approval — based on the identity, role, tool, action, parameters, and risk conditions you have defined.
- Credentials are brokered: If the request is approved, the gateway handles downstream authentication. For cloud-native services, it performs federated token exchange — Entra ID OBO, AWS STS AssumeRole, or Google impersonation. For SaaS platforms, it retrieves stored OAuth tokens from the vault and injects them. For legacy systems, it injects API keys. The agent never sees any of these credentials.
- Approved actions proceed: Only requests that satisfy policy reach the downstream MCP server, API, SaaS app, or internal service. The downstream system sees the request as if it came from the authorized user — with the right permissions, the right scope, and the right identity.
- Everything is recorded: Every decision, request path, and outcome is logged. The full trace — identity, agent, tool, action, parameters, policy decision, and result — is available for governance, operations, and investigations.
Summary
Datawiza Agent Gateway is a centralized security layer for AI agents that controls access, manages credentials, and audits all activity.
It routes agent requests through one enforcement point, applies real-time policies based on agent and user identity, securely handles authentication, and logs every action.
