Skip to content
hotnops edited this page Mar 26, 2026 · 2 revisions

πŸ›‘οΈ AgentCordon

Secure credential brokering and policy enforcement for autonomous AI agents

Server Cedar Rust


AgentCordon sits between your AI agents and the secrets they need. Agents never hold long-lived credentials β€” instead, they authenticate with Ed25519 challenge-response, request credentials through Cedar policy checks, and receive per-request ECIES-encrypted envelopes that only their private key can decrypt.


✨ Key Capabilities

Capability Description
πŸ” Zero-Trust Credential Vending Credentials encrypted at rest (AES-256-GCM), vended via ECIES β€” agents never see raw secrets
🌲 Cedar Policy Engine Fine-grained authorization with deny-by-default, tag-based access, and per-tool granularity
πŸ”Œ MCP Server Bridge Proxy MCP tool calls across workstations with automatic credential injection
πŸ”‘ Ed25519 + P-256 Identity Challenge-response auth with short-lived JWTs β€” no passwords, no API keys
πŸ“‹ Full Audit Trail Every credential vend, policy decision, and tool call is logged with correlation IDs
πŸ—οΈ 3-Crate Rust Architecture Core library + control-plane server + gateway CLI, backed by SQLite or PostgreSQL

πŸš€ Quick Start

# 1. Start the server
docker compose up -d

# 2. Install the CLI
curl -fsSL https://your-server:3140/install.sh | sh

# 3. Enroll a workspace
agentcordon init --server https://your-server:3140

# 4. Proxy an API call with injected credentials
agentcordon proxy github-token GET https://api.github.com/user

Tip

For CI/CD environments without a browser, use provisioning tokens: agentcordon init --server <URL> --token <TOKEN>


πŸ“š Documentation

Getting Started

Page Description
Workspace Enrollment How agents establish identity β€” Ed25519 keypairs, PKCE registration, provisioning tokens
Granting MCP Server Access Connect workspaces to MCP servers across machines with Cedar policies
Upgrading Zero-downtime upgrades for server and CLI β€” migrations, backups, rollback

Architecture & Security

Page Description
System Architecture 3-crate overview, API routes, middleware, data flow diagrams
Master Key HKDF-SHA256 key derivation, zeroization, nonce safety, key rotation
Credential Encryption AES-256-GCM at rest, ECIES vending, credential transforms, SSRF protection
Authorization & Cedar Policy Entity types, actions, deny-by-default, default policy walkthrough

Reference

Page Description
CLI Reference Complete command reference β€” init, proxy, mcp-serve, and all flags

πŸ›οΈ Architecture at a Glance

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”         β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚   AI Agent          β”‚         β”‚   AgentCordon Server (:3140) β”‚
β”‚   (Claude, Cursor)  β”‚         β”‚                              β”‚
β”‚                     β”‚         β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚         β”‚  β”‚  Cedar Policy Engine   β”‚  β”‚
β”‚  β”‚ agentcordon   β”‚  β”‚ Ed25519 β”‚  β”‚  (deny-by-default)     β”‚  β”‚
β”‚  β”‚ mcp-serve     │◄─┼─────────┼─►│                        β”‚  β”‚
β”‚  β”‚               β”‚  β”‚  ECIES  β”‚  β”‚  AES-256-GCM Vault     β”‚  β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚         β”‚  β”‚  ES256 JWT Issuer      β”‚  β”‚
β”‚          β”‚          β”‚         β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β”‚          β”‚ JSON-RPC β”‚         β”‚                              β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”  β”‚         β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚  β”‚ MCP Server    β”‚  β”‚         β”‚  β”‚ SQLite  β”‚ β”‚ Postgres  β”‚  β”‚
β”‚  β”‚ (subprocess)  β”‚  β”‚         β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚         β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ”§ Environment Variables

Key server configuration β€” see System Architecture for the full list.

Variable Default Description
AGTCRDN_LISTEN_ADDR 127.0.0.1:3140 Server bind address
AGTCRDN_MASTER_SECRET Auto-generated Root encryption secret (details)
AGTCRDN_DB_TYPE sqlite sqlite or postgres
AGTCRDN_SEED_DEMO true Seed demo data on first boot

Clone this wiki locally