Skip to content

Rebrand MCP Permissions docs to Agent Security + content & styling improvements#610

Merged
EliMoshkovich merged 47 commits intomasterfrom
dan/per-13548-agentsecurity-write-docs-for-agentsecurity
Mar 12, 2026
Merged

Rebrand MCP Permissions docs to Agent Security + content & styling improvements#610
EliMoshkovich merged 47 commits intomasterfrom
dan/per-13548-agentsecurity-write-docs-for-agentsecurity

Conversation

@danyi1212
Copy link
Contributor

@danyi1212 danyi1212 commented Feb 10, 2026

Rebrand MCP Permissions docs to Agent Security + content & styling improvements

Terminology rebrand

  • Renamed all references from "MCP Permissions" / "MCPermit" →
    Agent Security across titles, headings, and body content in
    architecture.mdx, guide.mdx, index.mdx, and overview.mdx
  • Removed the "upcoming product" info banner now that Agent
    Security is available

Documentation content improvements

  • architecture.mdx (+143/−113): Clarified trust level
    classifications, refined deployment options, updated
    permit.check() parameters, added user_profile resource for
    relationship-based permission derivation
  • guide.mdx (+203/−94): Rewrote consent flow description — users
    now select from pre-approved permissions rather than free-form
    grants; improved step-by-step setup guidance; added direct links
    to Dashboard, MCP Servers, and Humans pages
  • overview.mdx (+22/−19): Updated product positioning and
    description to match new terminology
  • index.mdx (+13/−14): Refreshed sidebar metadata and section
    intro

Mermaid diagram rendering fixes

  • custom.scss: Added theme variables and styling for Mermaid edge
    labels (fill, opacity) to prevent label/arrow overlap in
    flowcharts and sequence diagrams
  • docusaurus.config.js: Added Mermaid theme configuration for
    better background color handling and edge label visibility

Housekeeping

  • Removed yarn.lock; updated package-lock.json (dependency
    refresh)

Issues resolved

PER-13548
PER-14101
PER-14102
PER-14124
PER-14125
PER-14103
per-14106
PER-14107
PER-14104
PER-14105

Updated titles, descriptions, and content across multiple files to reflect the rebranding from MCPermit to Agent Security. Enhanced clarity on the architecture, setup, and core concepts of the Agent Security framework, ensuring consistency in terminology and improving user guidance for implementation.
Copilot AI review requested due to automatic review settings February 10, 2026 14:31
@linear
Copy link

linear bot commented Feb 10, 2026

@netlify
Copy link

netlify bot commented Feb 10, 2026

Deploy Preview for permitio-docs ready!

Name Link
🔨 Latest commit c5b1678
🔍 Latest deploy log https://app.netlify.com/projects/permitio-docs/deploys/69b2f0d5fd33510008dd7d74
😎 Deploy Preview https://deploy-preview-610--permitio-docs.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Refactors the MCP Permissions documentation to consistently use the new “Agent Security” terminology and updates content to better explain the product’s architecture, setup, and concepts.

Changes:

  • Renamed MCPermit/MCP Permissions terminology to Agent Security across docs pages.
  • Reworked “Getting Started” guide to match the hosted gateway flow (hosts, imports, consent, trust levels).
  • Updated architecture docs to reflect trust-level authorization model and “coming soon” features.

Reviewed changes

Copilot reviewed 4 out of 6 changed files in this pull request and generated 5 comments.

File Description
docs/ai-security/mcp-permissions/overview.mdx Rebrands overview page and aligns messaging with Agent Security terminology/capabilities.
docs/ai-security/mcp-permissions/index.mdx Updates section landing page titles/labels/links and refreshes core concept bullets.
docs/ai-security/mcp-permissions/guide.mdx Replaces prior MCPermit user guide with an Agent Security hosted setup + consent + trust-level walkthrough.
docs/ai-security/mcp-permissions/architecture.mdx Updates architecture narrative/diagrams to match Agent Security gateway + trust-level auth model and roadmap.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@argos-ci
Copy link

argos-ci bot commented Feb 10, 2026

The latest updates on your projects. Learn more about Argos notifications ↗︎

Build Status Details Updated (UTC)
default (Inspect) ⚠️ Changes detected (Review) 4 changed, 13 added, 4 removed Mar 12, 2026, 5:11 PM

Reflect the new platform flow where admins explicitly grant users access to MCP servers, users pick from a list during consent, and audit logs live in app.agent.security. Add authentication methods reference section covering email, social, passkey, SAML, and OIDC.
@orweis
Copy link
Contributor

orweis commented Feb 25, 2026

Need to add:

  • Screenshots and workflow diagrams
  • Explanation of the default policy
  • Guides -
    • “How to setup hosts for your organization”
    • “How to Manage human and agent relationships”
    • “How to customize gateway policies in Permit”
    • “How to run Agent.Security / Permit on-prem” - “here’s the basic idea- call us for details”
    • “How to use advanced features” (This is more marketing than anything right now)
      • Agent fingerprints via interrogation
      • Inject security snitch skills
      • Shadow Agent detection
      • Human in the loop
      • Workflow intent descriptions
      • Time limited consent

@danyi1212 danyi1212 removed their assignment Mar 2, 2026
…cumentation for MCP permissions to clarify hosted gateway URL and enhance resource mapping details.
…rify hosted gateway URL and refine trust level classification details.
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 4 out of 6 changed files in this pull request and generated 3 comments.


💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

…mentation. Update instructions on granting access, pre-authorization, and trust levels to enhance user understanding of the consent flow and permissions.
…rflow and adding padding for multi-line text.
…arity on API key usage, host definitions, and user consent flow. Update terminology for user permissions and trust levels to improve understanding of the setup process.
…descriptions of the proxy/gateway role, trust level classifications, and deployment options. Update terminology for clarity and include upcoming features for human-in-the-loop approvals.
…ol point for authorization, audit, and anomaly detection is planned. This change enhances clarity regarding future capabilities in the MCP permissions architecture.
…y adjusting the fill and opacity properties for better visibility.
…nt sections in the Dashboard, MCP Servers, and Humans pages. This enhances navigation and clarity for users managing hosts, servers, and user permissions.
…cations, refining deployment options, and adding a new `user_profile` resource for relationship-based permission derivation. Clarify examples and terminology for better understanding of agent roles and permissions.
…ss by adding theme variables for edge labels and improving background color handling for better visibility in flowcharts and sequence diagrams.
@CarlosMion CarlosMion changed the title Refactor MCP Permissions documentation to Agent Security terminology Rebrand MCP Permissions docs to Agent Security + content & styling improvements Mar 6, 2026
@dshoen619
Copy link
Contributor

@EliMoshkovich My latest commit addresses your previous comments

- Replace "Core Components" with full system architecture diagram showing
  all components: Platform UI, Consent Service, Gateway, Permit.io Cloud,
  PDP, PostgreSQL, Redis, and upstream MCP servers
- Update admin setup sequence to route through Platform UI instead of
  directly to Gateway: Admin → Platform → Gateway/Permit
- Add Platform UI and Permit.io as participants in first-time connection
  sequence diagram
- Remove Embedded WASM / Remote PDP deployment table (Permit PDP internals,
  not Agent Security deployment options)

Resolves: PER-14105

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@EliMoshkovich
Copy link
Contributor

@CarlosMion @dshoen619

Blocker — Broken link (architecture.mdx line 123)
Still links to /ai-security/mcp-permissions/permit-integration#the-userprofile-indirection-rebac — this page doesn't exist. Must be fixed or the link removed.

Warning — user_profile:subject placeholder (architecture.mdx line 128)
Still shows user_profile:subject instead of the actual format user_profile:human|{user_id}.

Warning — "consent service issues a JWT" (architecture.mdx line 151)
Still says "The consent service issues a JWT access token" — but the sequence diagram correctly shows the two-step code exchange (lines 194-196). Minor inconsistency.

CarlosMion and others added 10 commits March 10, 2026 12:35
The guide incorrectly implied OR semantics for domain restrictions.
Actual behavior is intersection: a domain must be allowed by BOTH the
global list AND the method-specific list. Added warning example showing
that per-method domains do not bypass the global list.

Resolves: PER-14104

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
- Clarify API reference link as "Permit.io API Reference" instead of
  implying it is an Agent Security-specific API
- Add one-sentence description of what Agent Security does
- Add prerequisites section (Permit.io account + Platform access)
- Add link to Platform UI at app.agent.security

Resolves: PER-14106

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
  description in architecture.mdx

  - Replace broken permit-integration link with internal anchor to
  trust ceiling section
  - Correct user_profile instance key from :subject to :user_id (| not
   allowed in Permit keys)
  - Clarify JWT issuance as two-step code exchange to match sequence
  diagram
… PER-14116 per-14119 PER-14118 Agent Security Docs Phase 2: Architecture diagrams, platform guides, and Permit integration (#612)

* PER 14120,14114,14117

* PER-14110,14111,14112

* Add Phase 2 docs: architecture diagrams, audit logs,
  permit integration, consent service, auth methods, on-prem
  deployment

  - PER-14120: Add 7 Mermaid diagrams to architecture.mdx (system
  overview, data flow, admin setup, consent flow with upstream OAuth,
  authorization decision flow, trust ceiling)
  - PER-14112: Expand permit-integration.mdx with derived role
  breakdown, allow-list enforcement, tenant model, default policy,
  customization guide
  - PER-14118: Add dedicated audit-logs.mdx page (screenshots pending)
  - Add consent-service.mdx, authentication-methods.mdx,
  on-prem-deployment.mdx
  - Add consent flow screenshots
  - Update guide.mdx and sidebars.js

* added audit log screenshots for PER-14118

* fix: correct technical inaccuracies in Agent Security docs

Critical fixes:
- C4: Fix Permit API endpoint /v2/api/tokens/scope → /v2/api-key/scope
  in architecture.mdx sequence diagram
- C5: Fix Redis key pattern host:{subdomain} → host_lookup:{subdomain}
  in two architecture.mdx sequence diagrams
- C1/C2/C3: Rewrite session expiry in consent-service.mdx — 90-day TTL
  is a rolling inactivity timeout (not absolute), remove non-existent
  30-day soft expiry, clarify these are MCP session TTLs not consent TTLs

Important fixes:
- I1: Add "(coming soon)" to HITL mentions in overview.mdx (meta + body)
- I2: Add missing NGINX routes (/api/consent/*, /api/mcp/*) to data flow table
- I3: Add "common pitfall" warning about granting user access in guide.mdx
- M1: Add explanation of mcp-remote tool in client config section
- M3: Clarify OPA/OPAL are used under the hood by Permit.io PDP

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* fix: correct MCP error code and clarify consent service wording

- architecture.mdx: permission denied error code is -32004, not -32001
  (-32001 is UNAUTHORIZED for missing/invalid tokens)
- consent-service.mdx: clarify that the profile-to-server relation is
  set by the admin and verified as a trust ceiling, not "confirmed"

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* docs: improve customer-friendliness and remove on-prem page

- Rewrite index.mdx: lead with outcomes instead of jargon (ReBAC, OPA,
  OPAL), organize navigation into "Start Here" and "Go Deeper" tiers
- Add "New to MCP?" callout in overview.mdx for non-AI-expert readers
- Reorder sidebar: Getting Started moved up to position 2, Architecture
  and Permit Integration moved to bottom as deep-dive reference
- Relabel Architecture → "Architecture Deep Dive" and Permit.io
  Integration → "Permit.io Integration Deep Dive"
- Remove on-prem-deployment.mdx (not ready for publication)
- Remove on-prem references and deployment table from architecture.mdx
- Update sidebars.js to match new page order

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

---------

Co-authored-by: eli <eli@permit.io>
Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
…#611)

* Update consent flow documentation and add new screenshots

- Revise consent flow steps in the guide and overview documents to reflect updated user experience.
- Introduce new images for sign-in, server selection, trust level setting, OAuth redirect, and processing consent.
- Add an empty state screenshot for users without server access.

This enhances clarity and visual guidance for users navigating the MCP client connection process.

* Add Advanced Features page for Agent Security

Introduces a new documentation page showcasing six advanced capabilities
(fingerprinting, snitch skills, shadow agent detection, HITL, workflow
intents, and time-limited consent) with Mermaid diagrams and status badges.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* Add troubleshooting guidance for duplicate MCP server connections

Introduces a warning about the potential issues caused by having the same MCP server configured through both Agent Security and as a direct connection. Clarifies that this can lead to the AI agent bypassing the gateway, and provides a specific fix to remove or disable the duplicate connection.

* Remove orphaned consent flow images

Delete 3 unreferenced images replaced by new consent-flow screenshots.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

* fix: correct TTL descriptions and soften roadmap language in advanced-features

- C1/C2/C3: Rewrite Time-Limited Consent section to accurately describe
  90-day rolling inactivity TTL (not absolute), clarify soft TTL is not
  yet implemented, and distinguish MCP session TTLs from consent permissions
- M4: Soften "coming soon" feature descriptions to avoid setting concrete
  expectations for unimplemented features

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>

---------

Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
Co-authored-by: eli <eli@permit.io>
- Delete orphaned advanced-features.mdx (not in sidebar, not linked)
- Change "Cloud or On-Prem" to "Cloud" in architecture diagram
- Change "on-prem AI" to "co-located AI" in integration patterns table

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
…oken refresh docs

- Align host creation steps in platform.mdx, host-setup.mdx, and
  architecture.mdx to match actual UI (Project + Environment dropdowns
  instead of Permit API Key field)
- Document both session TTLs accurately: soft 30-day inactivity TTL and
  hard 90-day absolute TTL (was incorrectly showing only 90-day inactivity)
- Fix tools display description in consent-service.mdx to match actual UI
  (flat list with dynamic Allowed/Denied badges, not grouped by trust level)
- Add upstream token auto-refresh note to the getting started guide
- Fix mislabeled session type in consent-service.mdx info box

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
- Introduced a new documentation page for Advanced Features, detailing capabilities such as agent fingerprinting, shadow agent detection, and human-in-the-loop approvals.
- Updated the sidebar to include a link to the new Advanced Features page, enhancing navigation for users seeking information on upcoming functionalities.
EliMoshkovich and others added 14 commits March 11, 2026 14:51
…mable diagrams, rename section

- Add Enterprise-only callout banner to Advanced Features page
- Remove all "coming soon" content from overview, architecture, and advanced features
- Remove Roadmap table and Planned Policy Enhancements section from architecture
- Create ZoomableDiagram component for click-to-expand Mermaid diagrams
- Move MCP Permissions from AI Security to top-level "Permit MCP Gateway" section
- Update all internal cross-references and add redirects for old URLs

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
- Render mermaid SVG at 1800px width in overlay for real zoom effect
- Make overlay use full 95vw/90vh with scroll for pan navigation
- Change hint from absolute-positioned to flow layout to avoid overlapping heading
- Prevent body scroll when overlay is open

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
- Add overflow:visible fix for mermaid edgeLabel foreignObject elements
- Split long edge label "/mcp, /oauth/*, /.well-known/*" with line break
  to prevent mermaid from miscalculating the label container size

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
- Hide all unreleased feature sections (Agent Fingerprints, Snitch Skills,
  Shadow Agent Detection, HITL, Workflow Intent) inside MDX comments
  so they're preserved for future use but invisible to readers
- Keep only Time-Limited Consent which is partially available today
- Clean up Time-Limited Consent description (remove "future releases" language)
- Update index.mdx link description to match

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Remind future editors to review and update the content against
the actual implementation before uncommenting.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Uncomment all previously hidden feature sections — Agent Fingerprints,
Snitch Skills, Shadow Agent Detection, HITL, and Workflow Intent
Descriptions are now implemented. Enterprise-only banner remains.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
…havior, sidebar ordering

- Fix OAuth discovery sequence diagram to route /.well-known/oauth-authorization-server to Gateway (not Consent Service)
- Document Dynamic MCPs feature (architecture, consent-service, permit-integration)
- Fix absolute server allow-list statement to account for dynamic MCPs opt-in
- Document /mcp/{static_mcp_key} path-based server selection
- Document list_tools visibility behavior (all tools visible, enforcement at call_tool)
- Fix Time-Limited Consent framing to distinguish built-in session expiry from Enterprise configurable windows
- Fix Policy-as-code claim (remove misleading Rego/GitOps/unit tests reference)
- Fix sidebar position conflicts (host-setup: 4→4.2, advanced-features: 4→9)
- Use realistic subdomain in architecture Redis key diagram

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
…lear labels

Rewrite to be a scannable overview with an `Enterprise` badge on each feature.
Remove detailed mermaid diagrams, lengthy explanations, and use cases.
Keep each section to 2-3 sentences describing what the feature does.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
…ceipts

- Rename "Agent Fingerprints via Interrogation" → "Agent Fingerprinting"
- Rename "Workflow Intent Descriptions" → "Intent-Based Access Control"
- Add "Permission Receipts" Enterprise feature
- Keep "Inject Security Snitch Skills" and "HITL" (future features)
- Keep "Enterprise" tier labeling (source of truth over mock-ui "Pro")
- Update index page reference

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
- Rename "Inject Security Snitch Skills" → "In-Session Monitoring" (clearer)
- Remove raw `Enterprise` code-block badges (redundant with top banner)
- Soften banner from :::caution to :::note (upsell, not warning)
- Simplify descriptions — focus on customer value, remove jargon
- Polish CTA section at bottom

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
- Add value-prop intro sentence before features
- Simplify Enterprise banner with single CTA (schedule demo)
- Condense session expiry info callout
- Strengthen bottom CTA with clear primary action

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Dynamic MCPs was only documented in the Architecture Deep Dive — too
buried for customers to find. Now documented in:
- Getting Started guide (after "Edit an MCP server", step 3)
- Platform page (Settings section, before Authentication methods)
Both link to the Architecture page for deeper technical details.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
- Platform page: trim to one-liner + link to guide
- Architecture page: trim to Permit-specific detail + link to guide
- Getting Started guide remains the authoritative section

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
The toggle lives in host Settings, so Platform is the natural home.
All other pages now link to Platform#dynamic-mcps instead of
duplicating content or linking to Architecture.

- platform.mdx: full instructions, toggle behavior, warning
- guide.mdx: tip callout + link to Platform
- architecture.mdx: Permit-specific detail + link to Platform
- consent-service.mdx: updated link to Platform
- permit-integration.mdx: updated link to Platform

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@EliMoshkovich EliMoshkovich merged commit c2ed790 into master Mar 12, 2026
5 of 6 checks passed
@EliMoshkovich EliMoshkovich deleted the dan/per-13548-agentsecurity-write-docs-for-agentsecurity branch March 12, 2026 20:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants