Solace Agent Mesh Enterprise
Agent Mesh Enterprise extends the open-source framework with production-grade features designed for enterprise environments. This version provides security through single sign-on integration, granular access control through role-based permissions, and observability tools for monitoring agent workflows and system performance.What’s Included
Enterprise is available as a self-managed container image that you can deploy in your own infrastructure. You can obtain access by joining the pilot program at solace.com/solace-agent-mesh-pilot-registration.Authentication & Authorization
Integrate with your existing identity systems through OAuth2-based Single Sign-On, supporting providers like Azure, Google, Auth0, Okta, and Keycloak. Implement role-based access control (RBAC) to define granular permissions for users and teams. Key Features:- OAuth2/OIDC authentication with automatic endpoint discovery
- SAM Access Tokens for efficient local validation
- Shared authentication between WebUI Gateway and Platform Service
- Trust Manager architecture for distributed token validation
- Multiple grant types: Client Credentials, Authorization Code, Refresh Token
Security & Governance
Enterprise provides security-first architecture with defense in depth:- Secure by Default: Deny-all authorization when no configuration exists
- Role-Based Access Control: Fine-grained permissions using scope-based authorization
- Token Security: ES256-signed JWTs with configurable TTL and automatic refresh
- Network Security: SSL/TLS support with custom CA certificates
- Credential Management: Shared credential model with connector-level access control
Data Management
Optimize costs and improve accuracy through advanced data management:- Connectors: Link agents to external data sources (SQL databases, APIs, knowledge bases)
- Data Filtering: Reduce unnecessary compute expenses
- Data Governance: Control information flow to prevent hallucinations
Observability
Gain visibility into your agent ecosystem:- Workflow Viewer: Track LLM interactions and agent communications in real time
- Performance Monitoring: Monitor system behavior and diagnose issues
- Audit Logging: Track authorization decisions and authentication events
Architecture
Component Overview
Agent Mesh Enterprise uses a distributed architecture:Authentication Flow
- User Login: Browser redirects to OAuth2 service
- Identity Provider: User authenticates with organizational credentials
- Token Exchange: Authorization code exchanged for access tokens
- Role Resolution: RBAC system resolves user roles and scopes
- SAM Token Minting: Gateway creates signed JWT with embedded roles
- Local Validation: Subsequent requests validated via Trust Manager
Getting Started
Installation Prerequisites
Before installing Agent Mesh Enterprise, ensure you have:- Docker installed and running
- Access to the Solace Product Portal
- An OAuth2 provider (Azure, Google, Auth0, Okta, or Keycloak)
- Client credentials from your OAuth2 provider
- A Solace broker (embedded or external)
Quick Start
-
Install Enterprise Image
-
Create Configuration Directory
-
Configure RBAC
Create
role-to-scope-definitions.yamlanduser-to-role-assignments.yamlinconfig/auth/See Authentication for examples. -
Launch Container
-
Verify Installation
Navigate to
http://localhost:8000and complete the OAuth login flow.
Core Concepts
Authentication vs Authorization
Authentication validates identity:- OAuth2 flow with external identity provider
- SAM Access Tokens for session management
- Token validation via Trust Manager
- RBAC with role-to-scope mappings
- Scope-based access control for tools, agents, and artifacts
- Wildcard support for flexible permissions
User Identity Resolution
The system extracts user identifiers from token claims in priority order:sub → client_id → username → oid → preferred_username → upn → unique_name → email → name → azp → user_id
- Email addresses are normalized to lowercase
- Non-email identifiers are case-sensitive
- Fallback to
sam_dev_userfor development
Trust Manager
The Trust Manager enables distributed token validation:- Gateway generates ephemeral EC key pair at startup
- Public key published as Trust Card to broker
- Components subscribe and store keys in Trust Registry
- SAM tokens validated locally using registry keys
- No network call to OAuth2 service needed
component_type: "gateway" can sign user identity JWTs.
Shared Authentication
Both WebUI Gateway and Platform Service use the same authentication middleware:- Single
MiddlewareRegistrysingleton - Shared
EnterpriseConfigResolverImpl - Same RBAC configuration via
SAM_AUTHORIZATION_CONFIG - Consistent authorization across all API endpoints
Authorization Types
| Type | Use Case | Behavior |
|---|---|---|
deny_all | Default | Rejects all access when no config exists |
default_rbac | Production | File-based RBAC with role definitions |
custom | Integration | External authorization systems |
none | Development | Grants wildcard * scope to all users |
Configuration Management
Environment Variables
Key environment variables for Enterprise:| Variable | Purpose | Required |
|---|---|---|
SAM_AUTHORIZATION_CONFIG | Path to enterprise config or raw JSON | Yes (for RBAC) |
FRONTEND_USE_AUTHORIZATION | Enable authentication | Yes |
EXTERNAL_AUTH_SERVICE_URL | OAuth2 service URL | Yes |
EXTERNAL_AUTH_PROVIDER | Provider name (azure, google, etc.) | Yes |
OAUTH2_ENABLED | Enable OAuth2 service | Yes |
OAUTH2_DEV_MODE | Allow HTTP for local development | No |
File Locations
Standard configuration file paths:Security Best Practices
Production Deployment
-
Disable Development Mode
-
Use HTTPS Everywhere
-
Restrict CORS Origins
-
Configure Session Timeouts
- Implement Least Privilege Assign minimal scopes required for each role.
Credential Management
- Store OAuth2 client secrets as environment variables
- Use Docker secrets or Kubernetes secrets for production
- Rotate credentials regularly
- Never commit secrets to version control
What’s Next
Authentication Setup
Configure OAuth2 and RBAC for secure access control
Security Best Practices
Implement defense-in-depth security measures
Enterprise Connectors
Connect agents to external data sources
Teams Integration
Deploy agents to Microsoft Teams
Support
For enterprise support:- Documentation: solace.com/docs/agent-mesh
- Community: solace.community
- Enterprise Support: Contact your Solace account team
- Pilot Program: solace.com/solace-agent-mesh-pilot-registration