MCP Integration
Model Context Protocol (MCP) is an open standard that lets AI assistants like Claude, ChatGPT, and others use external tools. Instead of copying data into chat windows or switching between dashboards, you ask your AI assistant directly: "show me agent health" or "halt that misbehaving agent." The assistant calls AgentLattice tools behind the scenes and returns structured results.
AgentLattice ships a built-in MCP server. This means your AI assistant becomes a governance operator -- it can query audit trails, check agent status, manage team members, triage anomalies, and take enforcement actions, all through natural language.
Why MCP?
The governance dashboard is designed for humans browsing at their own pace. MCP is designed for AI-assisted operations where you want to:
- Ask questions in natural language. "Which agents triggered anomalies in the last 12 hours?" is faster than navigating filters.
- Chain reasoning across tools. Your assistant can call
get_agent_health, spot a problem, then calllist_anomaly_eventsfor that specific agent, and suggest an enforcement action -- all in one conversation turn. - Operate from wherever you already work. If your team lives in Claude Desktop or another MCP-compatible client, governance is one tool call away instead of a tab switch.
- Automate incident response. A human reviews the AI's summary and confirms enforcement actions. The AI handles the data gathering; the human makes the call.
Available MCP Tools
AgentLattice exposes two categories of tools through its MCP server:
Identity & Access Management
| Tool | Description |
|---|---|
list_principals |
List all human members, AI agents, and pending invitations in your workspace |
invite_member |
Invite a new team member by email (member or viewer roles only) |
update_member_role |
Change a member's role (member or viewer -- admin promotion requires the dashboard for human approval) |
remove_member |
Remove a member from the workspace |
request_member_access |
Request access for someone, creating a pending invitation that requires admin approval |
Note the deliberate safety constraint: admin-level role changes cannot be performed through MCP. Privilege escalation requires human confirmation through the dashboard UI.
Security & Behavioral Monitoring
| Tool | Description |
|---|---|
get_agent_health |
Get circuit breaker state, calibration progress, and 24-hour anomaly summary for all agents |
list_anomaly_events |
List behavioral anomaly events, filterable by agent and time window. Returns anomaly type, threat taxonomy technique, score, and acknowledgement status |
list_incidents |
List security incidents, filterable by status (open, investigating, contained, closed) |
acknowledge_anomaly |
Acknowledge an anomaly as false positive, confirmed, or under investigation, with optional reasoning |
trigger_enforcement |
Halt or kill a misbehaving agent. Writes a tamper-evident enforcement event and updates the circuit breaker state |
resume_agent |
Resume a halted agent after investigation. Rolls back the latest enforcement event and restores monitoring |
Policy Management
| Tool | Description |
|---|---|
list_policies |
List all policies in the workspace, with their action types, conditions, and status |
get_policy |
Get a single policy by ID, including its full condition set and metadata |
create_policy |
Create a new policy with action type matching, conditions, and approval requirements |
update_policy |
Update an existing policy's conditions, description, or active status |
delete_policy |
Delete a policy by ID. Existing audit events referencing this policy are preserved |
Approval Management
| Tool | Description |
|---|---|
list_pending_approvals |
List actions waiting for operator approval, with the requesting agent and matched policy |
approve_action |
Approve a pending action. The agent is notified and can proceed with execution |
deny_action |
Deny a pending action with an optional reason. The agent receives the denial and reason |
Delegation Management
| Tool | Description |
|---|---|
list_delegations |
List active delegations in the workspace, showing parent-child agent relationships and expiry times |
grant_delegation |
Create a delegation from one agent to another with a time boundary and optional scope restrictions |
revoke_delegation |
Revoke an active delegation immediately. The child agent loses delegated permissions on the next action |
Webhook Management
| Tool | Description |
|---|---|
register_webhook |
Register a new webhook subscription with a destination URL and event type filter. Returns the signing secret (shown once) |
list_webhooks |
List all webhook subscriptions with their event filters, active status, and failure counts |
delete_webhook |
Delete a webhook subscription. Pending deliveries for this subscription are abandoned |
Every MCP action is recorded in the audit trail, tagged with the MCP key that performed it. There is no "shadow admin" problem -- MCP operations are as visible as any other action in the system.
Setup
Generate an MCP API Key
- Go to Settings > Security in the AgentLattice dashboard.
- Click Generate MCP Key. You will see the key exactly once -- copy it immediately.
- The key is prefixed with
al_mcp_for easy identification. Only the hash is stored server-side.
MCP key generation requires admin privileges and is itself recorded as an audit event.
Add to Claude Desktop
Open your Claude Desktop configuration file and add the AgentLattice MCP server:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
{
"mcpServers": {
"agentlattice": {
"url": "https://www.agentlattice.io/api/mcp",
"headers": {
"Authorization": "Bearer al_mcp_your_key_here"
}
}
}
}
Restart Claude Desktop. You should see "agentlattice" listed in your available tools.
Other MCP Clients
AgentLattice implements the standard MCP JSON-RPC protocol over HTTP. Any MCP-compatible client that supports HTTP transport and Bearer token authentication can connect using the same endpoint and key format.
Example Workflows
Morning Security Check
You: "Show me agent health across the org."
Claude calls
get_agent_healthand returns a table: three agents green (monitoring), one yellow (calibrating), one red (halted after last night's anomaly spike).You: "What happened with the halted agent?"
Claude calls
list_anomaly_eventsfiltered to that agent and summarizes: bulk data access pattern detected at 2:47 AM, anomaly score 87, auto-halted by circuit breaker policy.You: "That was a scheduled batch job. Mark it as a false positive and resume the agent."
Claude calls
acknowledge_anomalywith dispositionfalse_positive, thenresume_agentwith your justification. Both actions are recorded in the audit chain.
Team Access Review
You: "List everyone with access to this workspace."
Claude calls
list_principalsand returns members (with roles), active agents, and any pending invitations.You: "Remove the contractor who left last week."
Claude calls
remove_member. If the member has pending approval requests, it asks for confirmation before proceeding.
Incident Triage
You: "Show me open incidents."
Claude calls
list_incidentswith statusOPENand returns a summary including severity, affected agents, and threat taxonomy techniques observed.You: "The high-severity one on agent deploy-bot -- kill it and note that we're investigating a potential prompt injection."
Claude calls
trigger_enforcementwith actionKILLand your reasoning. The enforcement event is hash-chained for tamper evidence.
Security Model
MCP access is governed by the same principles as the rest of AgentLattice:
- Authentication: Every request requires a valid, non-revoked MCP key. Keys are SHA-256 hashed at rest -- AgentLattice never stores the raw key after initial generation.
- Workspace scoping: An MCP key can only access data and agents within its workspace. Cross-workspace access is architecturally impossible.
- Privilege boundaries: Admin-level operations (promoting users to admin, revoking other MCP keys) are deliberately excluded from MCP tools. These require human interaction through the dashboard.
- Audit trail: Every MCP tool invocation is logged with the key ID, making it trivial to trace who (or what) performed any action.
- Key revocation: Admins can revoke MCP keys instantly from the dashboard. Revocation is immediate -- the next tool call with that key will fail.
Revoking an MCP Key
If a key is compromised or no longer needed:
- Go to Settings > Security in the dashboard.
- Find the key by its label and click Revoke.
- Revocation is instant and irreversible. Any client using that key will receive an authentication error on the next request.
Key revocation is recorded as an audit event.