Further Reading
Technical documents, architecture guides, and research papers.
| Type | Title | |
|---|---|---|
| Paper | Authenticated Workflows: A Systems Approach to Protecting Agentic AI Cryptographic authentication across four control surfaces. Introduces MAPL policy language and distributed Policy Enforcement Points. | Download |
| Paper | Protecting Context and Prompts: Deterministic Security for Non-Deterministic AI Authenticated prompts with derivation chains and authenticated context with hash-chain integrity. Four formal security theorems. | Download |
| Overview | Zero Trust Agentic Identity Overview Strategic analysis of the agentic access control gap. Why traditional identity fails for AI agents. | Download |
| Guide | MAPL Policy Guide Complete tutorial for the MACAW Agentic Policy Language. Policy structure, inheritance, parameter constraints, and attestations. | Download |
| Architecture | Identity Flow Architecture MACAW's layered identity architecture. How JWT tokens flow through adapters and clients with multi-user isolation. | Download |
| Reference | Claims Mapping Reference Mapping enterprise identity provider claims to MACAW's policy model. Examples for Keycloak, Okta, Azure AD, and Google. | Download |
| Guide | Delegated Authentication How AI agents act on behalf of users with scoped permissions, audit trails, and cryptographic verification. | Download |
For more technical content, visit our blog