Skip to main content

Agent Registry

The Agent Registry is your central hub for managing all AI agents in your organization. Register new agents, configure risk thresholds, and control agent permissions.

Overview

The Agent Registry provides enterprise-grade agent lifecycle management with banking-level security controls.

Source: owkai-pilot-frontend/src/components/AgentRegistryManagement.jsx (SEC-024)

Compliance: SOC 2 CC6.1, PCI-DSS 8.3, NIST 800-53 AC-2

Getting Started

Accessing the Registry

  1. Navigate to Agent Registry in the sidebar
  2. View registered agents in the Agents tab
  3. View MCP servers in the MCP Servers tab

Registering a New Agent

Required Fields

FieldDescriptionExample
agent_idUnique identifierfinancial-advisor-001
display_nameHuman-readable nameFinancial Advisor AI
descriptionAgent purposeHandles investment queries
agent_typeSupervision levelsupervised or autonomous

Risk Configuration

Configure risk thresholds for each agent:

SettingDescriptionDefaultRange
default_risk_scoreBase risk for actions500-100
auto_approve_belowAuto-approve threshold300-100
max_risk_thresholdMaximum allowed risk800-100
requires_mfa_aboveMFA requirement threshold700-100

Autonomous Agent Thresholds (SEC-106c)

Autonomous agents have stricter defaults:

SettingDefaultDescription
autonomous_auto_approve_below20Lower auto-approve threshold
autonomous_max_risk_threshold60Lower maximum risk

Unregistered Agents

ASCEND does not require agents to be pre-registered before submitting actions. This enables rapid deployment while maintaining governance.

What happens when an unregistered agent submits an action:

  1. Action is accepted - Not rejected
  2. Stricter thresholds applied - auto_approve=30, max_risk=70
  3. Full audit logging - All actions recorded
  4. Response includes is_registered: false - Visibility for dashboards
  5. Alerts triggered more often - Lower threshold (70 vs 80)

Source: /ow-ai-backend/routes/actions_v1_routes.py:386-419

When to register an agent:

ScenarioRecommendation
Testing/developmentOptional - unregistered is fine
Production deploymentRecommended - custom thresholds
Autonomous operationRequired - configure autonomous thresholds
Compliance auditRecommended - documented agent inventory

To register an agent: Navigate to Agent Registry > Register New Agent in the ASCEND dashboard.

Agent Configuration

Permissions & Restrictions

{
"allowed_action_types": ["database_read", "api_read", "query"],
"allowed_resources": "*.read,public.*",
"blocked_resources": "*.pii,*.financial",
"alert_on_high_risk": true,
"alert_recipients": "security@company.com",
"webhook_url": "https://slack.webhook.url"
}

Enterprise Action Types (SEC-060)

Actions are classified by risk level:

Critical Risk

ActionNIST ControlMITRE ATT&CK
database_writeAC-3T1003
database_deleteAC-3T1485
privilege_escalationAC-6T1078
encryption_key_accessSC-12T1552.004
firewall_modifySC-7T1562.004

High Risk

ActionNIST ControlMITRE ATT&CK
pii_accessAC-3T1213
phi_accessAC-3T1213
file_writeAC-3T1485
config_modifyCM-3T1098

Medium Risk

ActionNIST Control
database_readAU-2
file_readAU-2
api_readAU-2

Low Risk

ActionDescription
queryRead-only queries
analyticsAnalytics access

Governance Controls (SEC-072)

Rate Limits

SettingDescriptionCompliance
max_actions_per_minuteActions/minute limitSOC 2 CC6.2, NIST SI-4
max_actions_per_hourActions/hour limitSOC 2 CC6.2
max_actions_per_dayDaily action limitSOC 2 CC6.2

Budget Controls

SettingDescriptionCompliance
max_daily_budget_usdDaily spending limitPCI-DSS 7.1, SOC 2 A1.1
budget_alert_threshold_percentAlert at percentageDefault: 80%
auto_suspend_on_budget_exceededAuto-suspend toggleDefault: true

Time Windows

Restrict agent operation to specific hours:

SettingDescriptionExample
time_window_enabledEnable time restrictionstrue
time_window_startStart time09:00
time_window_endEnd time17:00
time_window_timezoneTimezoneAmerica/New_York
time_window_daysAllowed days (0=Sun)[1,2,3,4,5]

Data Classifications

Control access to sensitive data:

ClassificationDescriptionCompliance
publicPublic data-
internalInternal use onlySOC 2
confidentialConfidential dataSOC 2, NIST
piiPersonal dataGDPR, HIPAA
phiHealth dataHIPAA 164.312
pciPayment dataPCI-DSS 3.4

MCP Server Integration

Register Model Context Protocol (MCP) servers:

MCP Server Fields

FieldDescription
server_nameUnique identifier
display_nameHuman-readable name
server_urlMCP server endpoint
transport_typestdio or http
governance_enabledEnable governance

MCP Governance Settings

{
"auto_approve_tools": "read_file,list_directory",
"blocked_tools": "delete_file,execute_command",
"tool_risk_overrides": {
"write_file": { "risk_score": 75 }
}
}

Agent Actions

Activate Agent

  1. Select agent from list
  2. Click Activate
  3. Confirm activation

Audit Trail: All activations logged with timestamp and user.

Suspend Agent

  1. Select agent
  2. Click Suspend
  3. Provide reason (optional)

Emergency Suspend

For immediate security response:

  1. Click Emergency Suspend
  2. Provide justification (required)
  3. Type agent ID to confirm

Note: Emergency suspensions trigger security team alerts.

API Reference

EndpointMethodDescription
/api/agent-registry/agentsGETList all agents
/api/agent-registry/agentsPOSTRegister new agent
/api/agent-registry/agents/{id}GETGet agent details
/api/agent-registry/agents/{id}PUTUpdate agent
/api/agent-registry/agents/{id}/activatePOSTActivate agent
/api/agent-registry/agents/{id}/suspendPOSTSuspend agent

Source: ow-ai-backend/routes/agent_registry_routes.py

Best Practices

  1. Use descriptive IDs: Include team and purpose in agent_id
  2. Start conservative: Use low auto-approve thresholds initially
  3. Enable time windows: Restrict autonomous agents to business hours
  4. Set budget limits: Always configure daily spending limits
  5. Review regularly: Audit agent permissions monthly

Source: AgentRegistryManagement.jsx, agent_registry_routes.py