Economic Access Control — built by security practitioners, not bolted on after.
SatGate implements Economic Access Control — a capability-based security model where every API request must present a cryptographically verified token with embedded access constraints.
Traditional APIs ask “who are you?” and maintain identity databases. SatGate asks “what can you afford?” — enforcing budgets, scopes, and delegation limits at the request layer. No user databases. No PII. No credential stuffing surface.
The gateway operates as a Policy Enforcement Point (PEP). No request reaches your upstream without passing cryptographic verification.
Agents authenticate through your existing identity infrastructure. SatGate Mint exchanges workload identity tokens (OIDC JWTs from Kubernetes, AWS IAM, or any OIDC provider) for capability-bearing macaroons with policy-defined constraints.
API keys are passwords. JWTs are ID cards. Macaroons are signed checks with spending limits — and every person who touches the check can only reduce the limit, never increase it.
A manager mints a token, carves off a weaker one for their team, who delegates further to an agent. Each step is cryptographically chained — no API call, no DB write. Permissions only shrink.
Caveats encode “only until 5pm,” “only for /openai/*,” or “max 200 credits.” Verified at the gateway on every request. The token carries its own budget.
Agents can't do OAuth flows or sign up for accounts. But they can hold a bearer token that encodes exactly what they're allowed to do and spend. That's a macaroon.
Revoking a parent token instantly invalidates all of its children. No propagation delay — the gateway checks revocation status on every request. Admin kill switch: immediate.
Three modes, one adoption path. Start safe, add enforcement when ready.
Verify → Allow → Log. Full visibility into agent traffic, cost attribution by team, zero enforcement. Free forever.
Verify → Enforce Budget → Allow. Per-agent spending caps, real-time budget enforcement. Works with Stripe, ERP — no crypto required. HTTP 402 when budget exhausted.
Verify → Payment Proof → Allow. L402 Lightning micropayments. Per-request pricing. Instant settlement, no invoices, no chargebacks.
SatGate is a Zero Trust Policy Enforcement Point for API access. It verifies every request and enforces scoped access — no network trust assumptions.
Deny-by-default. Every protected request verified before proxying.
Token validated on each request — no long-lived sessions or network zone trust.
Macaroon caveats restrict scope, method, TTL, and budget per token.
Cryptographic verification — no centralized user database required.
Need to evaluate SatGate for your security team? Download the full Security Posture Pack — covers architecture, encryption, data handling, audit, and compliance.
View Security Posture Pack →SatGate was founded by Wayne Mattadeen, a cybersecurity executive with 27+ years of experience across Deloitte, Accenture, and EY — including partner-level roles focused on enterprise security architecture and Zero Trust.
Security isn't something we're learning. It's where we come from.
Found a security vulnerability? Please report issues privately before public disclosure.
Email: security@satgate.io
All gateway code is open source under the Apache 2.0 License. Audit every line, fork it, run your own infrastructure.
View Source on GitHub →