Enterprise agent governance

Govern what agents can do.Prove every decision.

SatGate is the economic control plane for enterprise agents: scope authority before work starts, enforce policy at runtime, and preserve evidence after every allowed, denied, delegated, or revoked action.

Govern internal agents. Preserve proof across external rails.

The same capability chain scopes authority, enforces spend limits, preserves delegation lineage, and proves what happened whether the call stays internal or crosses into paid external access.

Your Agents (Internal)

Govern Authority

No scoped capability → no action. SatGate decides what each agent can do, spend, delegate, and continue doing before the request reaches your API.

Policy enforced before execution

Their Agents (External)

Preserve Proof

Payment proves value moved. SatGate proves the agent was allowed to move it across L402, x402, API-key billing, or enterprise ledgers.

Evidence preserved across rails
Same macaroon capability — same authority chain — one evidence trail

Built for enterprise control owners

Security. Finance. Platform.

Scoped authority, enforceable limits, and audit-ready evidence for autonomous agent work.

FinOps

Attributed agent spend

The problem: Shared API keys and pooled model bills hide which agent, route, token, or workflow created spend.

“SatGate turns spend into evidence: who created it, which authority allowed it, which policy governed it, and where the budget stopped.”

Metrics that matter:

Attribute spend to agent, token, route, tool, and policy before finance has to reconstruct it

CISO

Revocation proof

The problem: Agents now hold authority that used to require human approval. Security needs proof that scope, delegation, denial, and revocation actually worked.

“SatGate gives us a kill switch with evidence: the revocation receipt, the first denied call after revoke, and the authority chain that led there.”

Metrics that matter:

Prove unauthorized actions were blocked before data or spend moved

Platform

Protocol-independent governance

The problem: Agents are moving across internal APIs, MCP tools, and paid external rails. Governance cannot depend on which protocol the agent used.

“SatGate sits above MCP, API keys, x402, L402, and enterprise billing rails so every authority decision is recorded — payment or not.”

Metrics that matter:

One control path for internal workflows and governed external paid calls

Govern, enforce, prove.

Start with visibility, move enforcement into the request path, then export the evidence when security, finance, or audit asks what happened.

Observe

Map every agent, token, route, MCP tool, model, and workflow before enforcing policy. Observe mode builds the authority and spend picture without disrupting teams.

  • ✓ Agent and token inventory
  • ✓ Route, tool, and tenant attribution
  • ✓ Spend and authority mapping
  • ✓ Evidence-ready event capture

Control

Enforce scoped capabilities, budgets, tenant boundaries, delegation depth, expiry, and revocation before the next request reaches an API or MCP tool.

  • ✓ Per-agent and per-route policy
  • ✓ Scope and caveat enforcement
  • ✓ Delegation containment
  • ✓ Revocation before execution

Prove

Export mint receipts, delegation chains, spend ledgers, denial reasons, revocation proof, and paid-rail context in one Evidence Pack.

  • ✓ Evidence Pack exports
  • ✓ Signed denial and revocation trail
  • ✓ x402/L402/API-key billing context
  • ✓ Audit-ready authority timeline
ObserveControlProve
Real-World Scenario

The runaway agent story

Friday afternoon, the finance-automation parent agent delegates too much authority to an invoice-reconciler worker. The worker tries to export customer data and call a paid enrichment rail outside its scope. SatGate changes the ending by denying in the request path and exporting proof.

FRIDAY 4:47 PM

Worker Gets Broad Authority

“Just a quick test.” The invoice-reconciler worker gets broad authority: no narrow scope, no expiry, no delegation chain, no customer-data caveat.

SATURDAY — SUNDAY

Worker Attempts Unauthorized Tool

The worker calls an unauthorized MCP export tool and a paid enrichment rail outside its invoice-matching scope. Logs exist, but nobody can prove which authority allowed it.

WITH SATGATE: FRIDAY 4:48 PM

SatGate Denies Before Execution

SatGate checks the macaroon caveats in the request path. The scope and spend checks fail, so the export never executes and the paid call never settles.

FRIDAY 4:49 PM

Parent Authority Revoked

One click revokes the finance-automation parent. The invoice-reconciler child loses authority immediately, and the first post-revoke retry is denied with a signed reason.

AUTOMATIC

Evidence Pack Exported

Full Evidence Pack: who authorized the worker, what it could do, what it spent, what was denied, when authority was revoked, and the first denied call after revoke.

Turns a silent authority failure into a blocked action, a revocation receipt, and an Evidence Pack.

Govern first. Enforce before execution. Prove every decision afterward.

Receipts that roll up into Evidence Packs.

Real-time visibility into every agent, API call, policy decision, revocation, and dollar — with exports when proof matters.

Authority Dashboard

Authority Dashboard

See every active agent, capability, caveat, tenant, route, and MCP tool before authority becomes runtime risk.

Spend Attribution

Spend Attribution

Attribute every paid call to agent, token, route, tool, policy, and rail context before finance has to reconstruct it.

Revocation & Denial

Revocation & Denial

Track blocked scope violations, budget caveat hits, revocations, and the first denied call after revoke.

Audit Evidence Export

Audit Evidence Export

Export mint receipts, delegation chains, spend ledger entries, denial reasons, and revocation proof in one Evidence Pack.

Delegation that leaves a trail

Reuse the same invoice-reconciler lifecycle from the Evidence Pack: root policy delegates to a parent agent, then to narrower workers. Every level is scoped, budgeted, time-limited, and preserved for later proof.

Root Policy

Finance automation • tenant scoped • revocable

Finance Parent Agent

invoice:*

$10k/mo

Approval Agent

payment:approve

$5k/mo

Audit Export Agent

evidence:export

read-only

Invoice Reconciler

invoice:match

$500/day24h
Vendor Lookup Worker

vendor:read

$100/day8h
OCR Worker

document:ocr

$50/day1h
Exception Reporter

evidence:write

no-spend12h

Scoped

Narrower than parent

Budgeted

Hard spending limits

Time-Limited

Auto-expire by policy

Policy-limited

Sub-delegation stays inside caveats

Single Go Binary. Zero Dependencies.

Deploy anywhere in minutes. No JVM, no runtime, no dependency hell. One binary that runs on anything.

Docker

ghcr.io/satgate-io/gateway

Kubernetes

Helm chart included

Terraform

IaC modules ready

SaaS

cloud.satgate.io

Hybrid Mode

Gateway runs in your VPC. Dashboard in our cloud (or yours). Your data never leaves your infrastructure. The best of both worlds: self-hosted security, managed convenience.

The Core Problem

The authority commons — inside your company

Every shared internal API is now an authority surface. When agents inherit broad credentials, nobody can prove which policy allowed the action, which team owned it, or where the limit should have stopped it. Governance fails when authority is invisible.

Without SatGate

  • • Agents inherit broad API keys
  • • Delegation happens outside the control plane
  • • Spend and access are reconstructed after the fact
  • • Revocation requires rotating shared secrets
  • • Audit depends on screenshots and log joins

With SatGate

  • • Every agent gets scoped, revocable authority
  • • Delegated workers inherit narrower limits
  • • Policy, budget, and scope denials stop requests before execution
  • • Revocation creates proof plus a post-revoke denial
  • • Evidence Pack exports answer who, what, why, spend, denial, and revoke
The Opportunity

Your internal APIs are authority surfaces

Every internal service — databases, search indexes, ML models — now receives autonomous agent requests. SatGate makes the authority visible and enforceable before the call runs, then proves what happened afterward. It's not just usage tracking. It's policy-to-proof governance.

📊

Authority discovery

See which agents, teams, tools, and workflows are asking for power before you enforce limits.

⚖️

Runtime enforcement

Policy, caveats, budgets, and revocation run in the request path before the agent reaches the upstream service.

💰

Evidence export

Every mint, delegation, paid call, denial, and revocation produces receipts that can land in an Evidence Pack.

“Stop giving AI agents standing authority.”
Give them scoped capabilities. Enforce policy before execution. Export proof after.

Live Demo

See authority minted — then prove the lifecycle

SatGate Mint exchanges workload identity tokens for capability-bearing macaroons. The same Mint flow works for internal calls and governed external paid calls — every grant becomes part of the Evidence Pack.

Launch Interactive Demo

3-step flow: Mock IdP → Mint Exchange → Verified Macaroon

From Demo to Thousands of Agents

The same exchange you just saw works identically at scale. No secrets management. No credential rotation. Identity is the credential.

1

Define trust policies

Map identity claims to budgets, scopes, and TTLs. One policy per agent class — not per agent instance.

2

Agents self-provision

Each agent reads its environment identity (K8s SA, IAM role, OIDC token) and exchanges it for a macaroon. One API call. No human in the loop.

3

Export the evidence

Every grant, paid call, denial, delegation, and revocation produces a receipt for the Evidence Pack when you need to prove what happened.

# Agent startup (3 lines — works in any runtime)
IDENTITY=$(cat /var/run/secrets/tokens/satgate-token)
TOKEN=$(curl -s -X POST $SATGATE_MINT_URL \
  -d "{\"credentials\": \"$IDENTITY\"}" | jq -r '.token')
export SATGATE_TOKEN=$TOKEN
# That's it. Agent connects through SatGate with budget-scoped access.

FAQ

AI agent governance questions

What is AI agent governance?

AI agent governance is the set of controls that determines which agents can call which APIs, tools, and models; how much they can spend; what authority they can delegate; and when access must be revoked. For autonomous agents, governance needs request-path enforcement, not just logs and dashboards.

What is an economic control plane for AI agents?

An economic control plane for AI agents sits in the request path and applies scopes, budgets, delegation rules, revocation, and audit before an agent reaches an upstream API, model, or MCP tool. It turns agent activity into governed decisions with evidence.

How should enterprises govern MCP tool usage?

Enterprises should govern MCP tools with per-tool budgets, scoped capability tokens, task and tenant attribution, Evidence Packs, revocation, and hard request-path policy decisions. Rate limits and dashboards are useful, but they do not replace enforcement before tool calls execute.

What is the difference between AI governance and AI agent governance?

AI governance usually covers model risk, data policy, compliance, and human review. AI agent governance adds request-path controls for autonomous actions: scopes, budgets, delegated authority, revocation, denial reasons, spend attribution, and proof before APIs or MCP tools execute.

Is SatGate tied to x402, L402, AgentCore Payments, or Pay.sh?

No. x402, L402, AgentCore Payments, Pay.sh, and related rails make it easier for agents to call paid services. SatGate is protocol-independent: it records the requesting agent, allowed action, policy basis, spend context, and evidence needed for audit, review, and control — payment or not.

Ready to govern your AI agents?

We're working with enterprise teams that need scoped authority, runtime enforcement, and evidence before agents scale. Start with Observe, then move to Control and Policy-to-Proof when you're ready.

Observe first • Enforce next • Export proof when it matters