Adding tutorials for integrating Asgardeo with KONG and WSO2 AI Gateways for agent identity management#5882
Conversation
|
Note Reviews pausedIt looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the Use the following commands to manage reviews:
Use the checkboxes below for quick actions:
WalkthroughAdds two tutorial pages and corresponding include files documenting integration patterns between Asgardeo and the Kong and WSO2 AI Gateways for agent identity-aware access control (architecture, Asgardeo setup, gateway configuration, and verification). Changes
Sequence Diagram(s)mermaid Estimated code review effort🎯 3 (Moderate) | ⏱️ ~25 minutes Poem
🚥 Pre-merge checks | ✅ 2 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (2 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
📝 Coding Plan
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment Tip CodeRabbit can use your project's `biome` configuration to improve the quality of JS/TS/CSS/JSON code reviews.Add a configuration file to your project to customize how CodeRabbit runs |
There was a problem hiding this comment.
Actionable comments posted: 2
🤖 Fix all issues with AI agents
In
`@en/includes/tutorials/integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md`:
- Line 110: Replace the grammatically incorrect phrase "the both proxies" in the
sentence that reads "Make sure you configure Backend Settings and Deploy the
both proxies to development and Production Environments." with "both proxies"
(e.g., change to "Make sure you configure Backend Settings and deploy both
proxies to Development and Production environments.") and normalize
capitalization of "deploy" and "environments" to match surrounding style.
- Line 166: The link to WSO2 Bijira guardrails in the sentence containing the
URL "https://wso2.com/bijira/docs/create-api-proxy/third-party-apis/guardrails/"
is returning HTTP 403; either replace it with a correct public documentation
URL, add a note that the page requires special access/credentials, or remove the
link and provide an alternative public reference or an inline summary of the
guardrails; update the sentence in the markdown file to use the corrected URL or
the access note so users are not led to a forbidden page.
…y-for-agent-identity-aware-access-control.md Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
Co-authored-by: Pavindu Lakshan <pavindulakshan@gmail.com>
Co-authored-by: Pavindu Lakshan <pavindulakshan@gmail.com>
Updated terminology for clarity and consistency in application naming.
| - **The Coordinator Agent**: A fast, cost-effective agent that classifies incoming tickets. | ||
| - **The Expert Agent**: A "deep thinking" agent reserved for critical, complex infrastructure outages. |
There was a problem hiding this comment.
I’m not sure whether we can use this as a concrete example. Typically, when there is a coordinator agent, it delegates tasks to multiple sub-agents. In this case, however, there is only a single agent involved, which makes the coordinator role seem redundant, in my opinion.
There was a problem hiding this comment.
My idea was to have a agent to classify the incoming tickets. There can be many sub agents under him, I didn't mention them to keep the example more simple and focusing on showing how to secure the AI gateway.
|
|
||
| ### Step 3: Register AI agents | ||
|
|
||
| Since these are autonomous agents, we create **"Service Accounts"** for them. WSO2 Agent Identity is a great way to do this. |
There was a problem hiding this comment.
We don't create service accounts for ai agents in Asgardeo.
There was a problem hiding this comment.
we create 'auth identities' for them. Is this term okay? @pavinduLakshan
| - **Identifier**: `https://agenttype` (Doesn't need to be publicly accessible, just an identifier). | ||
| - **Display Name**: `agenttype`. |
There was a problem hiding this comment.
Let's provide a meaningful identifier and display name. agenttype doesn't sound meaningful enough
pavinduLakshan
left a comment
There was a problem hiding this comment.
Let's add docs to the identity-server/next folder too.
…e-access-control.md Co-authored-by: Pavindu Lakshan <pavindulakshan@gmail.com>
…e-access-control.md Co-authored-by: Pavindu Lakshan <pavindulakshan@gmail.com>
…e-access-control.md Co-authored-by: Pavindu Lakshan <pavindulakshan@gmail.com>
…e-access-control.md Co-authored-by: Pavindu Lakshan <pavindulakshan@gmail.com>
Purpose
This pull request adds two new end-to-end tutorials to the Asgardeo documentation, focusing on integrating Asgardeo with both WSO2 AI Gateway and Kong AI Gateway for agent identity-aware access control. These tutorials provide detailed, step-by-step guides for securely managing non-human agents in multi-agent AI systems, including configuration of identity, roles, scopes, routing, authorization, and rate limiting.
New Tutorials and Documentation Updates:
Added links to two new tutorials in the main tutorials index: "Integrating Asgardeo With WSO2 AI Gateway for Agent Identity-Aware Access Control" and "Integrating Asgardeo With Kong AI Gateway for Agent Identity-Aware Access Control".
Added new tutorial files that include the respective content for integrating Asgardeo with WSO2 AI Gateway (
integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md) and Kong AI Gateway (integrating-asgardeo-with-kong-ai-gateway-for-agent-identity-aware-access-control.md). [1] [2]Tutorial Content Additions:
Summary by CodeRabbit