Home
News
Tech Grid
Interviews
Anecdotes
Think Stack
Press Releases
Articles
  • Agentic AI

Permit.io Launches MCP Gateway for Secure AI Agent Authorization


Permit.io Launches MCP Gateway for Secure AI Agent Authorization
  • by: Source Logo
  • |
  • March 26, 2026

AI agents are already calling enterprise tools in production today through the Model Context Protocol (MCP), yet they often operate without fine-grained authorization, delegation tracking, or audit trails.

Quick Intel

  • Permit.io launches MCP Gateway to add authorization, delegation tracking, and audit for AI agents using MCP
  • Solution requires only a single URL change with no SDK or code modifications needed
  • Applies fine-grained, real-time authorization powered by OPA and Zanzibar-style relationship-based access control
  • Tracks full delegation chain from human to agent while enforcing trust ceilings
  • Addresses OWASP-identified risks such as Shadow MCP Servers and lack of governance
  • Built on Permit.io’s proven authorization engine used by enterprises including Tesla, Cisco, and Intel

The Growing Security Gap in MCP

AI agents in production query CRMs, read codebases, write to data warehouses, and chain tool calls across sensitive systems via MCP. However, security and compliance teams lack a standard way to authorize agent actions, track delegation of authority, or maintain audit trails. As MCP adoption accelerates—with 97 million monthly SDK downloads and support from major players including Anthropic, OpenAI, Google, Microsoft, and AWS—this gap is becoming critical.

MCP has been donated to the Linux Foundation’s Agentic AI Foundation, signaling its transition into core enterprise infrastructure. Yet, unlike HTTP with TLS or APIs with OAuth, MCP currently lacks a dedicated security layer.

Real-World Risks Highlight the Need

Shadow MCP Servers, unsanctioned agent connections that bypass governance, are classified by OWASP as a top-10 MCP risk. Incidents such as Asana temporarily disabling its MCP feature due to a data leak and a vulnerability in the widely used mcp-remote npm package underscore the dangers. Without proper controls, the blast radius extends beyond data leaks to autonomous actions that no one approved.

Permit MCP Gateway Delivers Enterprise-Grade Controls

Permit MCP Gateway closes this gap by acting as a zero-trust proxy. Every agent tool call is authorized in real time using Permit.io’s battle-tested engine, which powers fine-grained authorization at scale for leading organizations. The gateway tracks the complete delegation chain from human to agent and enforces trust ceilings to prevent agents from exceeding granted permissions.

The solution integrates seamlessly: organizations simply change one URL. No SDK installation or modifications to existing MCP servers or agents are required. It supports real-time enforcement while maintaining full auditability and consent management.

"Every protocol that became enterprise infrastructure eventually needed a purpose-built security layer. MCP has reached that moment," said Or Weis, CEO and co-founder of Permit.io. "The difference is that agents do not just read, they act. Without authorization, the blast radius is not a data leak. It is an autonomous system doing things no one approved."

Permit MCP Gateway enables secure, governed adoption of MCP while preserving the protocol’s speed and simplicity. It brings authentication, fine-grained authorization, consent, and audit capabilities to AI agents connecting to enterprise tools.

  • Agentic AIZero TrustCybersecurity
News Disclaimer
  • Share