Docs/Further Reading

Further Reading

Technical documents, architecture guides, and research papers.

TypeTitle
PaperAuthenticated Workflows: A Systems Approach to Protecting Agentic AI

Cryptographic authentication across four control surfaces. Introduces MAPL policy language and distributed Policy Enforcement Points.

Download
PaperProtecting Context and Prompts: Deterministic Security for Non-Deterministic AI

Authenticated prompts with derivation chains and authenticated context with hash-chain integrity. Four formal security theorems.

Download
OverviewZero Trust Agentic Identity Overview

Strategic analysis of the agentic access control gap. Why traditional identity fails for AI agents.

Download
GuideMAPL Policy Guide

Complete tutorial for the MACAW Agentic Policy Language. Policy structure, inheritance, parameter constraints, and attestations.

Download
ArchitectureIdentity Flow Architecture

MACAW's layered identity architecture. How JWT tokens flow through adapters and clients with multi-user isolation.

Download
ReferenceClaims Mapping Reference

Mapping enterprise identity provider claims to MACAW's policy model. Examples for Keycloak, Okta, Azure AD, and Google.

Download
GuideDelegated Authentication

How AI agents act on behalf of users with scoped permissions, audit trails, and cryptographic verification.

Download

For more technical content, visit our blog