Move next Tuesday's partner call to a free slot and email everyone.
I need temporary calendar and Gmail access for this task.
Identity GenAuth
GenAuth maps human authority into scoped, revocable agent capabilities. Token Exchange, OAuth2 M2M, RBAC + ReBAC, MCP gateway — pre-wired and governed. Your agent calls Gmail with its own credentials, never the user's password.
The choice
Without it, agents borrow user tokens or run with root credentials. Prompt injection leaks them. One stolen agent = one compromised user. Audit logs can't tell "who actually did this" when every action carries the same human OAuth scope.
Your agent gets its own short-lived digital badge — scoped, revocable, and audited per delegation. Gateway-level enforcement physically blocks privilege escalation, even when the LLM hallucinates. 30+ tools (Gmail, GitHub, Notion) are wired up as MCP tools, ready to call.
MCP ecosystem
GenAuth sits between agent intent and tool execution. It grants the minimum capability needed for the task, then records the full chain from human approval to third-party API result.
Real workflow
The agent never borrows the user's login. It asks for one scoped badge, uses it across MCP tools, and leaves an audit trail a human can replay.
Move next Tuesday's partner call to a free slot and email everyone.
I need temporary calendar and Gmail access for this task.
Find free slots
allowedCreate calendar event
allowedDraft invite email
allowedIdentity controls
Keep your branded login and enterprise controls, then extend them to agents: MFA, policy conditions, scoped sessions, and capability review all live in one model.
Human approves the agent's root delegation once.
Ask for proof only when a task crosses a boundary.
What you can do
Token Exchange and OAuth2 M2M, pre-wired. Each agent gets a short-lived credential — scoped to one task, revoked the moment the task ends.
See it in docs →RBAC and ReBAC checks happen at the network edge. The LLM cannot escalate privilege by hallucinating — the gateway denies it before the call leaves your VPC.
See it in docs →Every delegation, every call, every outcome lands in an immutable timeline. Name the human, the agent, the scope, the result — compliance-ready out of the box.
See it in docs →Code samples and the full API live in the docs. This page tells you why; docs tell you how.