System Overview
How Everything Connects
Zero-trust security architecture connecting AI agents to your tools safely
Our Security Guarantee
Zero credential exposure: Clients use gateway tokens only. Real API keys stay encrypted in Vault and are injected server-side during execution.
Component Details
Inside Peta: Core, Console, and Desk
From zero-trust gateway to human-in-the-loop controls
Peta Core
The zero-trust gateway and runtime that intercepts every MCP request, issues short-lived Peta service tokens, keeps external keys sealed in the Vault, and orchestrates managed MCP servers on demand.
Zero-Trust Gateway
Validates identity, policy, and HITL rules before routing any MCP call
Managed MCP Runtime
Transform REST APIs into MCP servers, auto-scale warm pools, and manage lifecycle automatically
Vault & Secret Injection
External credentials stay encrypted server-side; only Peta service tokens reach clients
Peta Console
The control plane for configuring policies and guardrails, provisioning Peta service tokens, and monitoring every MCP workspace from a single dashboard.
Team & AI Management
Grant precise tool access and approval rules per tenant, workspace, or agent
Service Token Lifecycle
Issue, rotate, and revoke gateway-only Peta service tokens without touching external keys
Live Observability
Track usage, costs, and audit trails across every MCP operation
Peta Desk
The desktop application that bundles an MCP client, auto-configuration engine, and human-approval console so end users and hosts connect securely without touching raw credentials.
Works Everywhere
Native desktop experience on macOS, Windows, and Linux
Human-in-the-Loop Controls
Route risky actions for approval; AI suggests, humans decide
Auto Client Configuration
Inject Peta service tokens and MCP configs into ChatGPT, Claude, Cursor, and more without manual JSON edits
IMPLEMENTATION
How Peta Gateway Works
Multi-layered security architecture operating in parallel to protect your credentials
CONNECTION LAYER
Authentication & Session Management
How AI agents connect and authenticate to the gateway:
PROCESSING LAYER
Request Validation & Execution
How each request is processed through the gateway:
CONTROL LAYER
Policy Enforcement Mechanisms
Multi-dimensional security controls evaluating every request:
Specifications
Enterprise-Ready Infrastructure
Key specifications for buyers and technical reviewers
Core Specifications
Start Building
Secure MCP Infrastructure
Deploy in 30 minutes—complete guide with downloads, setup instructions, and best practices