Explainer
AgentGateway
The Problem
Why Agent Gateways?
You've deployed MCP servers for your tools and A2A agents for orchestration. Now you have a new problem: governance.
Traditional API gateways don't help: they handle stateless HTTP, not stateful JSON-RPC sessions with long-lived connections.
What AgentGateway Solves
The Control Point
AgentGateway is an open-source gateway built specifically for agentic AI. Solo.io contributed it to the Linux Foundation in 2025. It sits between your agents and the tools/agents they connect to.
Key Capabilities
Expose multiple MCP servers through a single endpoint. Clients see one unified tool catalog. Gateway handles routing.
Implement MCP Authorization spec once at the gateway. Supports Keycloak, Auth0, and other OAuth providers with automatic spec compliance.
Fine-grained RBAC using Cedar (Amazon's policy language). Control which users can access which tools at the tool level.
OpenTelemetry integration for metrics, logs, and distributed tracing across all agent traffic. See what's happening.
MCP Federation
The Problem It Solves
Without a gateway, each MCP client must:
- Know about every MCP server endpoint
- Handle auth separately for each server
- Manage connections to multiple servers
With MCP federation, clients connect to one gateway endpoint. The gateway:
- Aggregates tools from multiple backend MCP servers
- Routes requests to the right server based on tool name
- Applies policies before forwarding
- Handles sessions for stateful MCP connections
Auth Portals for External Servers
The harder problem: third-party MCP servers that use their own IdPs.
The challenge:
- External MCP server (e.g., Salesforce) has its own OAuth
- Your enterprise IdP isn't involved
- No central control over who can connect
AgentGateway's auth portal feature manages these external connections:
- User authenticates to your enterprise IdP first
- Gateway checks if user is allowed to connect to the external server
- Gateway manages the OAuth flow to the external IdP
- Tokens stored securely, refreshed automatically
Result: single enforcement point for both internal and external MCP connections.
Authorization with Cedar
Why Cedar?
Cedar is a policy language created by Amazon for fine-grained authorization. It's designed for RBAC (role-based), ABAC (attribute-based), and ReBAC (relationship-based) access control.
AgentGateway uses Cedar to express policies like:
Analysts can search the CRM, but can't delete records. Policy is declarative, auditable, and separate from code.
Tool-Level Access Control
Combined with OBO tokens that identify both user and agent, you get full accountability.
See It In Action
Gateway Policy Enforcement
LLM Gateway
Unified Provider Access
AgentGateway also acts as an LLM gateway, providing a single endpoint for multiple AI providers:
All exposed via an OpenAI-compatible API. Benefits:
- Unified auth: One API key, gateway handles provider auth
- Cost tracking: Centralized usage metrics across providers
- Inference routing: Route based on model, cost, latency, availability
- Prompt guards: Regex filters, webhook validation before requests hit providers
Deployment
Built for Production
Configuration via YAML with xDS for dynamic updates without downtime.
What's Still Missing
Early in the Journey
β Maturity
Early in its Linux Foundation lifecycle. Validate performance, protocol coverage, and RBAC maturity for your environment.
β Outbound auth complexity
Auth portals help, but managing OAuth flows to dozens of external IdPs is operationally complex.
β Cross-org trust
Same gap as MCP and A2A: no verification of capability claims, no delegation chain tracking across organizations.
AgentGateway is governance for your trust domain. The cross-org trust layer (DIDs, VCs) is still the missing piece.
Alternatives
Other MCP Gateways
AgentGateway's differentiator: A2A support and Cedar policies. Others focus primarily on MCP.
Learn More