Authorised Agents

The only agents built authorisation-first.

We built the authorisation infrastructure. Then we built agents on top of it, so every action they take is authorised before it executes, by design, not by addition.

The difference

Every other platform bolts governance on after the fact.

When you build agents on top of the authorisation layer, authorisation isn't a wrapper, it's the foundation. Every skill, every automation, every connector runs under the same enforcement boundary that governs any agent in your stack.

Bring your own agents and add the Authorisation Layer, or start with Authorised Agents and get the full stack from day one.

Option A, Full stack
Authorised Agents
Skills Automations Connectors
↕ OR bring your own agents
Authorisation Layer
Every action authorised or denied · Cryptographic proof
Foundation
01, Skills

Tell the agent exactly what to do.

Custom skills define any capability the agent should have. Write a skill once and reuse it across agents. Every skill execution passes through the authorisation layer before it runs, so you always know what was done, by whom, and whether it was permitted.

  • Define any task or capability as a named, reusable skill
  • Attach skills to any agent, legal, banking, fraud, or custom
  • Each skill declares the authorisation scope it requires to run
  • Skill executions are logged with signed authorisation verdicts
  • During plan mode, the agent suggests skills not yet in your skill set and auto-creates them once approved
Skills
In Practice

Skills as authorisation units

A skill can't run if the agent doesn't hold the permissions it requires. No silent fallbacks.

Build once, govern everywhere

One skill definition, consistent enforcement across every agent it's attached to.

Full audit per execution

Every skill run is a signed authorisation event in the Provenance Vault. Exportable on demand.

02, Automations

Workflows that run, only when authorised.

Schedule and trigger multi-step agent workflows. Automations are aware of their own authorisation state at every step. High-stakes steps pause and wait for a verdict before continuing, no action executes outside the enforcement boundary.

  • Scheduled and event-driven automation triggers
  • Multi-step workflows with authorisation gates at any step
  • Automation pauses and waits for human authorisation before continuing
  • Every step logged with its authorisation decision
Automations
In Practice

Nothing executes without a verdict

Every automation step has an authorisation decision attached to it. No step runs in a grey area.

Human-in-the-loop, by design

Automations can require human authorisation at any step. The workflow pauses, not fails, until approved.

Audit-ready by default

Every automation run produces a complete authorisation trace. Who triggered it, what ran, what was approved or denied.

03, Connectors

Connect to your systems, with authorisation scope.

Every connector carries a declared permission scope. The authorisation layer enforces that scope before the connector can touch any data or system. Agents connect to the tools they need, within exactly the boundaries you set.

  • Google Drive, read and write within authorised folders only
  • Gmail, send and read within authorised accounts and scopes
  • Telegram, messaging within authorised channels
  • Any platform with an API, Salesforce, Trello, HubSpot, Jira, and every tool in your stack
Google Drive
Gmail
Telegram
Any platform
In Practice

Connectors can't exceed their scope

A connector authorised for read-only access cannot write. Enforced at the authorisation boundary, not the application layer.

Every data access is an authorisation event

When an agent reads a file or sends a message, that's a logged, signed decision, not a silent background call.

Revoke instantly

Remove a connector's authorisation and every agent using it stops immediately. No cascading changes required.

The Foundation

Authorised Agents run on the same infrastructure as Sentinel.

Every agent action, whether triggered by a skill, an automation, or a connector, passes through the authorisation layer. Cryptographic proof, policy enforcement, Provenance Vault. The same enforcement boundary that governs any agent in your stack.

Explore the Authorisation Layer

Agents that can prove every action was authorised.

Start with one agent and one workflow. Deploy in days. See what authorisation-first looks like in production.