Skip to main content

Gateway Integration Overview

FieldValue
Document IDASCEND-SDK-007
Version1.0.0
Last UpdatedDecember 19, 2025
AuthorAscend Engineering Team
PublisherOW-KAI Technologies Inc.
ClassificationEnterprise Client Documentation
ComplianceSOC 2 CC6.1/CC6.2, PCI-DSS 7.1/8.3, HIPAA 164.312, NIST 800-53 AC-2/SI-4

Reading Time: 5 minutes | Skill Level: Beginner

Overview

ASCEND Gateway integrations provide zero-code AI governance for your existing API infrastructure. Route all AI agent traffic through ASCEND without modifying agent code.

Why Gateway Integration?

BenefitDescription
Zero Code ChangesNo modifications to existing agents
Centralized ControlSingle point of governance
Fail SecureDeny by default on errors
PerformanceDecision caching for sub-millisecond latency
ObservabilityComplete audit trail

Architecture

┌─────────────────────────────────────────────────────────────────────┐
│ GATEWAY ARCHITECTURE │
├─────────────────────────────────────────────────────────────────────┤
│ │
│ ┌─────────┐ ┌─────────────┐ ┌─────────────┐ │
│ │ AI │ │ API │ │ Backend │ │
│ │ Agent │───────▶│ Gateway │───────▶│ Service │ │
│ │ │ │ │ │ │ │
│ └─────────┘ └──────┬──────┘ └─────────────┘ │
│ │ │
│ │ Authorization │
│ │ Request │
│ ▼ │
│ ┌─────────────┐ │
│ │ ASCEND │ │
│ │ Authorizer │ │
│ │ │ │
│ │ ✓ Evaluate │ │
│ │ ✓ Cache │ │
│ │ ✓ Log │ │
│ └──────┬──────┘ │
│ │ │
│ │ Policy Decision │
│ ▼ │
│ ┌─────────────┐ │
│ │ ASCEND │ │
│ │ Platform │ │
│ └─────────────┘ │
│ │
└─────────────────────────────────────────────────────────────────────┘

Available Integrations

AWS Lambda Authorizer

For Amazon API Gateway (REST API, HTTP API).

# CloudFormation
Resources:
AscendAuthorizer:
Type: AWS::ApiGateway::Authorizer
Properties:
Type: REQUEST
AuthorizerUri: !Sub arn:aws:lambda:${AWS::Region}:...

Best For:

  • AWS-native deployments
  • Serverless architectures
  • API Gateway users

📖 Full Guide

Kong Plugin

Native Kong Gateway plugin.

# Kong declarative config
plugins:
- name: ascend
config:
api_key: owkai_your_key_here
environment: production

Best For:

  • Kong Gateway users
  • Multi-cloud deployments
  • Plugin-based architecture

📖 Full Guide

Envoy/Istio ext_authz

External authorization for service mesh.

# Envoy configuration
http_filters:
- name: envoy.filters.http.ext_authz
typed_config:
grpc_service:
envoy_grpc:
cluster_name: ascend-authz

Best For:

  • Kubernetes deployments
  • Istio service mesh
  • Microservices architecture

📖 Full Guide

Comparison

FeatureLambdaKongEnvoy
PlatformAWSAnyAny
ProtocolHTTPHTTPgRPC
Caching
Fail ModeConfigurableConfigurableConfigurable
MetricsCloudWatchKongPrometheus
DeploymentServerlessPluginSidecar/Pod

Common Configuration

All gateway integrations share these concepts:

Agent ID Header

Identify the calling agent:

X-Ascend-Agent-ID: my-agent-001

If not provided, behavior depends on configuration:

  • Required mode: Request is denied
  • Optional mode: Request is allowed (not governed)
  • Default ID mode: Uses a default agent ID

Path Exclusions

Skip governance for certain paths:

excluded_paths:
- "^/health$"
- "^/metrics$"
- "^/public/.*"

Fail Mode

Behavior when ASCEND is unavailable:

ModeBehaviorUse Case
fail_closedDeny all requestsHigh security (default)
fail_openAllow all requestsHigh availability

Decision Caching

Cache approved decisions for performance:

SettingDescriptionRecommendation
cache_ttl: 0No cachingHigh-security
cache_ttl: 6060 second cacheBalanced
cache_ttl: 3005 minute cacheHigh-volume

Response Headers

All integrations add these headers to responses:

HeaderDescriptionExample
X-Ascend-DecisionDecision resultapproved, denied
X-Ascend-Action-IDAction identifier12345
X-Ascend-Risk-ScoreRisk score3.5
X-Ascend-Risk-LevelRisk levellow, medium, high

Decision Flow

Request Received


┌─────────────┐
│ Path │──── Excluded ────▶ Allow (no governance)
│ Excluded? │
└─────────────┘
│ No

┌─────────────┐
│ Agent ID │──── Missing + Required ──▶ Deny (401)
│ Present? │
│ │──── Missing + Optional ──▶ Allow (no governance)
└─────────────┘
│ Present

┌─────────────┐
│ Check │──── Hit ────▶ Allow (cached)
│ Cache │
└─────────────┘
│ Miss

┌─────────────┐
│ Call │──── Error + Fail Closed ──▶ Deny (503)
│ ASCEND │
│ │──── Error + Fail Open ────▶ Allow (warning)
└─────────────┘
│ Success

┌─────────────┐
│ Process │──── Approved ──▶ Allow + Cache
│ Decision │
│ │──── Pending ───▶ Deny (or Allow based on config)
│ │
│ │──── Denied ────▶ Deny (403)
└─────────────┘

Quick Start

1. Choose Your Gateway

If you use...Choose...
Amazon API GatewayLambda Authorizer
Kong GatewayKong Plugin
Envoy Proxy / IstioEnvoy ext_authz

2. Deploy the Authorizer

Follow the specific guide for your platform.

3. Configure Your Agents

Add the agent ID header to requests:

import requests

response = requests.get(
"https://api.yourcompany.com/data",
headers={
"X-Ascend-Agent-ID": "my-agent-001"
}
)

4. Monitor in Dashboard

View all governed requests in the ASCEND dashboard.

Next Steps

Choose your gateway integration:


Document Version: 1.0.0 | Last Updated: December 2025