Private Beta — Contact us to get set up.
Connector registry
The connector registry controls which tool sources exist for your organization. An admin enables connectors—internal MCP servers, external services, browser extension tools—and they become available to users. This is org-level configuration. You decide once which connectors are allowed, and that decision propagates everywhere. Want to add a new internal API? Register it. Want to block an external service? Remove it. For external connectors (third-party MCP servers), you can require admin approval before users connect. This prevents shadow IT—users can’t just wire up arbitrary external services without visibility. Version pinning locks connectors to specific versions, preventing unexpected changes from upstream.Role entitlements
Roles come from your IDP. When a user authenticates, their token includes role claims—engineering, support, finance, whatever your organization uses.
Role entitlements map these roles to connector access:
| Role | Gets access to |
|---|---|
engineering | Internal APIs, GitHub, Jira |
support | CRM, Help Desk |
finance | Billing, Invoicing |
App/origin constraints
Even with the right role, tools can be restricted by where they’re invoked from. Domain allowlists limit which origins can use which tools. CRM tools might only work fromcrm.example.com. Production database tools might be blocked from staging environments entirely.
This prevents tools from escaping their intended context. A user might have access to sensitive tools, but only when they’re in the right application.

