Replies: 1 comment
-
Hi there, thanks for raising this! You're spot-on: our goal is a first-class, enterprise-grade MCP Gateway with AuthN/AuthZ between agents and tools, Kubernetes-native deployment with a Horizontal Pod Autoscaler, stateless replicas via Redis, Alembic-managed database migrations, configurable We're also focused on a good developer experience to drive adoption, so Where it fits on the roadmapAuthentication, Authorization, Security & Identity
Federation & Routing
AuthN/AuthZ/RBAC
Deployment
Quality & security automation
How you can helpOpen a Feature issue using the provided template, describing additional security, enterprise features, etc. or submit a PR - would love to hear more from you if you have other ideas or features. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
MCP and A2A offer solutions at different layers of the agentic AI stack, and both may exist separately from each other.
One area that A2A excels is enterprise authentication and authorization features
MCP is making an effort to offer this in a client-server context, but A2A is thinking about infinite agent scale. i.e. N agents calling N agents using N Oauth providers.
I'd love to see more robust enterprise features in mcp-context-forge - maybe add this one to the roadmap?
NOTE: Application to Application partial support does not appear to be the same thing as agent to agent authn and authz
Beta Was this translation helpful? Give feedback.
All reactions