Main
Use Jarvis Registry as your single authenticated entrypoint: proxy MCP/A2A traffic instead of wiring each copilot to each tool.
Configure OIDC first (Keycloak/Cognito/Entra ID), then connect clients and register servers/agents behind the gateway.
Treat ACLs as code: start with least privilege and scope permissions down to tool level as you add integrations.
Turn on tracing/metrics early (OpenTelemetry + Prometheus) so incidents have an audit trail and latency budgets.
README (excerpt)
Connect any AI copilot or autonomous agent to your enterprise tools — through a single, secure MCP gateway with built-in identity, access control, and full observability.
What is Jarvis Registry?
Jarvis Registry is an open-source, enterprise-grade MCP (Model Context Protocol) and A2A Agent Gateway and Workflow Orchestration platform built by ASCENDING Inc.
It solves one of the hardest problems in enterprise AI: giving AI copilots and autonomous agents secure, governed access to internal tools and data — without fragmented integrations or security blind spots.
| Capability | Description |
|---|---|
| MCP Gateway & Reverse Proxy | Single authenticated entry point for all AI clients and agents using MCP over SSE or Streamable HTTP |
| AI Copilot Integration | Connect Cursor, Claude Desktop, GitHub Copilot, VS Code, and any MCP-compatible copilot to enterprise tools |
| A2A Agent Orchestration | Register and manage autonomous agents; orchestrator agents coordinate worker agents through the same secure gateway |
| Identity & Access Management | OAuth 2.0/OIDC with Keycloak, Amazon Cognito, and Microsoft Entra ID — no custom auth code needed |
| Fine-Grained Access Control | ACL engine enforces scope-based, role-based permissions down to the individual tool level |
| Skill & Context-Based Discovery | Semantic search over skills, descriptions, and tags so agents and copilots find the right MCP server or A2A agent at runtime |
| Audit & Observability | Full request logging, OpenTelemetry tracing, and Prometheus metrics |
Source-backed notes
- README Quick Start uses
uv sync+docker compose --profile full up -d, then opens the UI athttp://localhost:80. - README lists OAuth 2.0/OIDC integrations (Keycloak, Amazon Cognito, Microsoft Entra ID).
- README highlights audit/observability features: request logging, OpenTelemetry tracing, and Prometheus metrics.
FAQ
- Is it open-source?: Yes—GitHub license metadata shows Apache-2.0.
- Do I need Docker to try it?: Docker Compose is the fastest local path per README; Kubernetes is optional for production.
- What clients can connect?: README mentions MCP-compatible copilots (Cursor/Claude Desktop/VS Code) via gateway transports.