External Agent Ecosystem

How External Agent Suppliers Connect to MeMesh

External suppliers are supported through enterprise SSO, policy boundaries, and governed onboarding workflows.

Can External Agent Providers Sign In?

  • Yes. Provider users sign in through the same enterprise OIDC SSO callback flow.
  • User account status is enforced (`pending`, `active`, `suspended`, `offboarded`) before session issuance.
  • Tenant boundary is enforced at login; cross-tenant identity is rejected fail-closed.
  • Role bindings determine what a provider user can view or mutate after login.

Provider Program Capabilities

Agent Submission and Validation

Register A2A-compatible agent endpoints and validate URL/safety requirements before listing.

Trust Lifecycle Tracking

Track progression from sandbox to reviewed/verified with quality and policy evidence.

Issue-Centric Operations

Provider-facing anomalies can be routed as issue tickets for coordinated remediation.

API-First Integration

Supplier integration can be automated through governed API flows for enterprise procurement and ops.

Usage and Deployment Modes

Direct Provider Hosting

Provider hosts agent endpoint; enterprise controls invocation policy and runtime guardrails.

Customer Private Endpoint

Provider model is deployed into customer-controlled private cloud with stricter network policy.

Managed Review Funnel

Provider submissions go through validation, review board checks, then controlled activation.

Recommended Provider Onboarding Flow

  1. Provision supplier users through SSO + SCIM/JIT with tenant-scoped identities.
  2. Assign supplier role bindings and scope before enabling submission APIs.
  3. Run sandbox validation and controlled pilot before broader catalog exposure.
  4. Move to reviewed/verified tier only after policy and quality evidence gates pass.

Permission Boundary Example

Provider Operator

Submit/update provider-owned agent metadata and monitor own submission status.

Enterprise Reviewer

Review submissions, trigger trust-tier transitions, and request remediation evidence.

Tenant Admin

Manage role bindings, approval gates, and tenant-level provider governance policy.