What’s in an identity
| Field | Purpose |
|---|---|
| Name | A human-readable name for the agent (e.g., support-agent, ci-bot) |
| Labels | Key-value metadata used in policy evaluation (e.g., team: support, env: production) |
| Credential | A secret token the agent uses to authenticate with the gateway |
| Allowed tools | An optional list restricting which tools this identity can see and call |
Credentials
Each identity has a credential — a secret string the agent uses to authenticate with the gateway. MCP clients include it as a bearer token in theAuthorization header:
- Securely stored — credentials are hashed and never stored in plaintext
- Single-use display — the secret is shown once when created, then never again
- Revocable — you can revoke a credential at any time from the console
- Expirable — optionally set an expiration date
Labels
Labels are key-value pairs attached to an identity. They’re available in policy evaluation asidentity.labels.
team: support/team: engineering/team: dataenv: production/env: stagingrole: agent/role: servicevendor: openai/vendor: anthropic
Allowed tools
By default, an identity can see all tools registered in the project. You can restrict this by setting an allowed tools list.| Configuration | Behavior |
|---|---|
| Not set (null) | Identity can see and call all tools in the project |
Empty list [] | Identity can see no tools |
Specific tools ["get_issue", "list_issues"] | Identity can only see and call these tools |
Task-level allowed tools override identity-level restrictions. If a task defines its own tool list, it takes priority.
Identity in policy context
During policy evaluation, the identity is available as:Next steps
Create identities
Step-by-step guide to creating identities in the console.
Tasks
Learn how tasks add scoped context on top of identities.