Skip to content
Agentic Control Plane

One control plane for every AI model

Multi-tenant MCP gateway with identity-verified governance. Tenant isolation, custom connectors, built-in integrations, and a full dashboard — all powered by GatewayStack's open-source modules.

Model-agnostic
Works with ChatGPT, Claude, Cursor, Windsurf, and any MCP client. See exactly which AI is calling, on every request.
IdP-agnostic
Bring your own identity provider. Auth0, Okta, Entra ID, Firebase, or any OIDC/JWKS-compatible issuer. Your users, your rules.
Full audit trail
Every tool call logged with client, user, latency, and result. Filter by AI client, tool, user, or status in real time.
Agentic Control Plane activity log showing tool calls with user identity, status, client, and response time

Every tool call logged with verified identity, client attribution, and latency.

Built-in connectors. Custom APIs. One URL.

Start with pre-built connectors for popular services, or point ACP at any HTTP API and it becomes an MCP tool — with auth, validation, and audit built in.

GitHub
Repos, issues, PRs, code search
Salesforce
Records, queries, objects
Slack
Channels, messages, threads
Jira
Issues, projects, boards
Confluence
Pages, spaces, search
Linear
Issues, projects, teams
Notion
Pages, databases, blocks
HubSpot
Contacts, deals, companies
Google
Drive, Calendar, Gmail
Custom APIs
Any REST endpoint, your schema

Custom connectors are defined in the dashboard — point to any URL, define the input schema, and ACP handles authentication forwarding, SSRF protection, and request validation.

Agentic Control Plane connector marketplace with built-in and custom connectors

Add built-in integrations or define custom HTTP connectors — all governed by the same pipeline.

What ACP solves

Six concrete problems your AI agents create the moment they reach production — and how ACP closes each one.

Stop sharing one API key across all users
Without identity propagation, every tool call looks the same to your backend. ACP binds the originating user's verified JWT to every call — your audit log, rate limits, and policies all work per-user, not per-key.
Block dangerous tool calls before they fire
Deny-by-default policies enforced at the dispatch layer, not in the prompt. Define allowed tools per agent tier, narrow scopes per delegation hop. Background agents can't call destructive verbs that interactive sessions can.
Detect PII and secrets in tool I/O
Inputs and outputs scanned for SSNs, emails, API keys, and tokens. Configurable per tenant. Either redact in-flight or block the call. Findings logged so your security team can audit what almost leaked.
Cap runaway agent spend
Per-user budget limits and rate caps enforced before tool execution. Detects retry loops and out-of-bounds usage in real time. A single agent stuck in a tight loop can't burn through your monthly budget overnight.
Govern across every framework you use
Same audit log for Claude Code, Cursor, Codex CLI, CrewAI, LangGraph, OpenAI Agents SDK, Anthropic Agent SDK, and any MCP client. One control plane above every framework — no per-vendor governance silos.
Hand your CISO an audit trail that survives a real review
Every governed call logged with verified actor, tool name, decision, reason, chain depth, root identity, and findings. Exportable to JSON, CSV, webhook, or your SIEM. The evidence your compliance team needs for SOC 2, HIPAA, and EU AI Act workflows.
Agentic Control Plane content policy with PII detection, risk scoring, and automatic redaction

PII detection, risk-score blocking, and automatic redaction — configured per tenant, no code required.

How it works

1
Sign in
Authenticate with your identity provider. Supports Auth0, Okta, Entra ID, and any OIDC-compliant provider.
2
Create a tenant
Each tenant gets an isolated gateway endpoint, its own configuration, and separate audit logs.
3
Configure your IdP
Point your identity provider at the tenant's audience. ACP Cloud handles JWKS discovery and token verification.
4
Connect integrations
Add built-in integrations or define custom connectors. Each connector runs through the full governance pipeline.
5
Monitor
View audit logs, track usage, and manage policies from the dashboard. Every request is attributed to a verified user.

Integration examples

ACP Cloud integrations are HTTP tools that run through the full governance pipeline. Define them in the dashboard or use built-in connectors.

GitHub — list repositories

Built-in integration. Connects to GitHub's API with OAuth token forwarding. The gateway verifies the caller's identity, checks their permissions, and logs the request before forwarding to GitHub.

tool: github_list_repos
auth: forward_bearer
endpoint: GET api.github.com/user/repos
scopes: tool:github:read

Custom connector — internal API

Define any HTTP tool in the dashboard. ACP Cloud injects authentication, enforces SSRF protection, and applies your tenant's policies. No code required.

tool: lookup_customer
auth: service_oauth
endpoint: POST crm.internal/api/customers
scopes: tool:crm:read

Built on open source

ACP Cloud runs all six GatewayStack modules in its request pipeline. Every tool call is identified, transformed, validated, rate-limited, routed, and audited — same governance engine, managed for you.

What ACP Cloud adds on top: multi-tenant isolation, a web dashboard for configuration and audit review, built-in integrations (GitHub, Salesforce), custom HTTP connectors, and deployment on Cloud Run with Firestore-backed config.

Ready to get started?

Start governing AI access in minutes. No credit card required.