Skip to main content

Gateway Integrations

Zero-code AI governance for your existing API infrastructure

Deploy AI agent governance without modifying a single line of application code. ASCEND gateway integrations intercept API requests at the infrastructure layer, evaluating each action against your security policies before reaching backend services.

Choose Your Gateway

GatewayBest ForSetup TimeDeployment Method
AWS API GatewayAWS-native environments< 1 hourCloudFormation / SAM
Kong GatewayKong users, multi-cloud< 30 minLuaRocks / Helm
Envoy / IstioKubernetes, service mesh< 30 minHelm

Feature Comparison

FeatureAWS LambdaKongEnvoy/Istio
FAIL SECURE
Circuit Breaker
Decision Caching
Kill-Switch
Health ChecksCloudWatchHTTPgRPC
MetricsCloudWatchKong MetricsPrometheus
Retry with Backoff

How It Works

┌─────────────┐     ┌─────────────┐     ┌─────────────────┐     ┌─────────────┐
│ AI Agent │────▶│ Gateway │────▶│ ASCEND Authz │────▶│ ASCEND API │
│ (Client) │ │ (Proxy) │ │ (Plugin/Ext) │ │ (Platform) │
└─────────────┘ └──────┬──────┘ └────────┬────────┘ └──────┬──────┘
│ │ │
│ │◀─────────────────────┤
│ │ Decision Response │
│◀────────────────────┤ │
│ Allow/Deny │ │
▼ │ │
┌─────────────┐ │ │
│ Backend │ │ │
│ Service │ │ │
└─────────────┘ │ │

Request Flow

  1. AI Agent sends API request with X-Ascend-Agent-Id header
  2. Gateway intercepts request and forwards to ASCEND authorizer
  3. ASCEND Authorizer evaluates action against policies via ASCEND API
  4. Decision returned: approved, denied, or pending_approval
  5. Gateway allows request to backend or returns error response

FAIL SECURE Design

Critical Security Feature

All gateway integrations are configured to FAIL SECURE by default. If ASCEND is unreachable, requests are DENIED, not allowed.

ScenarioBehaviorHTTP Response
ASCEND API unreachableRequest DENIED503
ASCEND API timeoutRequest DENIED503
Invalid API keyRequest DENIED401
Missing agent ID headerRequest DENIED401
Circuit breaker openRequest DENIED503
Action denied by policyRequest DENIED403
Pending approval requiredRequest DENIED403

Required Headers

All gateway integrations expect these headers:

HeaderRequiredDescription
X-Ascend-Agent-IdYes*Unique identifier for the AI agent
X-Ascend-EnvironmentNoExecution environment (production/staging/development)
X-Ascend-Data-SensitivityNoData sensitivity level (none/pii/high_sensitivity)

*Required unless default_agent_id is configured in the gateway.

Response Headers

On successful authorization, these headers are added to the upstream request:

HeaderDescription
X-Ascend-StatusDecision: approved, pending_approval, denied
X-Ascend-Action-IdUnique action ID for audit trail
X-Ascend-Risk-ScoreCalculated risk score (0-100)
X-Ascend-Risk-LevelClassification: low, medium, high, critical

Circuit Breaker (Kong & Envoy Only)

Kong and Envoy/Istio integrations include circuit breaker protection to prevent cascade failures:

Closed → [5 failures] → Open → [30s] → Half-Open → [success] → Closed
→ [failure] → Open
ParameterDefaultDescription
Threshold5 failuresFailures before opening circuit
Reset Timeout30 secondsTime before attempting recovery

Quick Decision Guide

Choose AWS Lambda Authorizer if:

  • ✅ You use AWS API Gateway (REST or HTTP API)
  • ✅ You want native CloudWatch metrics and dashboards
  • ✅ You prefer SAM/CloudFormation deployment
  • ✅ You need Python-based customization

Choose Kong Plugin if:

  • ✅ You run Kong Gateway (OSS or Enterprise)
  • ✅ You need circuit breaker protection
  • ✅ You want LuaRocks package management
  • ✅ You use Kong's declarative configuration

Choose Envoy/Istio if:

  • ✅ You run Kubernetes with Istio service mesh
  • ✅ You need gRPC-native performance
  • ✅ You want Helm-based deployment
  • ✅ You need to govern pod-to-pod traffic

Common Questions

Q: Do I need the SDK if I use a Gateway?

A: No! Gateway integration provides zero-code governance. The SDK is for deep application integration.

Q: Can I use both SDK and Gateway?

A: Yes! This provides defense in depth. Gateway blocks unauthorized requests before they reach your app, and SDK adds fine-grained control within your app.

Q: What happens during ASCEND maintenance?

A: All gateways FAIL SECURE by default. During maintenance, requests are denied. You can configure fail_open: true for non-critical environments (not recommended for production).

Q: How do I test the integration?

A: Each gateway guide includes test commands. Send a request with X-Ascend-Agent-Id header and check the response headers.

Next Steps

Support