Checkpoint Docs
Govern

Govern

Deploy MCP-I servers for AI agent governance with delegations, proofs, and consent flows

What is Govern?

Checkpoint Govern enables you to deploy and manage MCP-I (Model Context Protocol with Identity) servers for comprehensive AI agent governance. While Detect identifies agents and Enforce blocks or redirects them, Govern provides a framework for authorizing agents — letting verified AI agents interact with your resources under controlled conditions.

Govern implements a zero-trust model: every AI agent request must carry a cryptographic proof of identity and authorization before accessing protected resources.

How It Works

AI Agent → MCP-I Proof → Your Server → Checkpoint Verification → Protected Resource

                                    Dashboard (audit trail)
  1. An AI agent obtains a delegation (authorization grant) through an OAuth flow
  2. The agent creates a cryptographic proof for each request, referencing the delegation
  3. Your server uses @kya-os/bouncer-middleware to verify the proof with Checkpoint
  4. If valid, the request proceeds with verified agent identity attached
  5. All activity is logged to the Checkpoint dashboard for audit

Key Concepts

Agent DIDs

Every AI agent is identified by a DID (Decentralized Identifier), such as did:key:z6Mk.... This provides a stable, verifiable identity for agents across sessions and services.

Delegations

A delegation is an authorization grant from a user or service to an AI agent. It specifies what the agent can do (scopes), for how long, and under what constraints. Think of delegations as OAuth tokens for AI agents.

Learn more about delegations

Proofs

A proof is a cryptographic assertion attached to each request. It contains the agent's DID, the target audience, a nonce, and a reference to the delegation that authorizes the request.

Learn more about proof verification

Scopes

Scopes define fine-grained permissions. For example, files:read allows reading files while payment:create allows initiating payments. Each delegation grants specific scopes, and each protected endpoint can require specific scopes.

Verifiable Credentials

Checkpoint issues and verifies verifiable credentials that attest to agent identity and permissions. These are signed by Checkpoint's infrastructure and can be independently verified.

Deployment Options

Checkpoint supports two deployment models:

ModelDescriptionInfrastructure
Dashboard DeployOne-click setup with GitHub repo + Cloudflare WorkerYour GitHub + Cloudflare account
Self-Host (BYOK)Full control with MCP-I packagesYour infrastructure

Deploy an MCP-I Server →

Migrating an Existing MCP Server

Already have a standard MCP server? Add MCP-I identity and authorization without rewriting your server.

Migration Guide →

Authentication Methods

When an agent requests access, the user must authenticate. Checkpoint supports multiple methods:

MethodDescription
Consent OnlySimple approve/deny — no external auth required
OAuthSign in with GitHub, Google, Microsoft, and more
Custom ProviderConnect your own authentication backend
CredentialsUsername/password or API key authentication

Compare authentication methods →

Quick Start

1. Install the middleware

npm install @kya-os/bouncer-middleware

2. Protect an endpoint

import express from 'express';
import { createBouncerMiddleware } from '@kya-os/bouncer-middleware';

const app = express();
app.use(express.json());

app.post(
  '/api/files',
  createBouncerMiddleware({
    apiKey: process.env.CHECKPOINT_API_KEY!,
    projectId: process.env.CHECKPOINT_PROJECT_ID!,
    requiredScopes: ['files:write'],
    reputationThreshold: 60,
  }),
  (req, res) => {
    // Access verified agent info
    const { agentDid, scopes, reputation } = req.bouncer;
    res.json({ message: 'File created', agent: agentDid });
  }
);

3. Configure tools in the dashboard

Navigate to Project → Control Access → Tools to define which tools require delegations and what scopes they need.

Features

FeatureDescription
DeploymentDeploy MCP-I servers via dashboard or self-host
MigrationAdd MCP-I to an existing MCP server
Auth MethodsOAuth, Consent Only, Credentials, Custom Providers
DelegationsCreate and manage authorization grants for AI agents
ProofsVerify cryptographic proofs on every request
OAuthStandard OAuth flows for agent authorization
Tool ProtectionPer-tool scope requirements and access control
Consent FlowsUser consent UI for agent authorization

Govern vs Enforce

GovernEnforce
PurposeAuthorize known agentsBlock unknown agents
ModelAllow-list with cryptographic verificationDetect and apply policies
Use caseMCP server developers, API providersWebsite and app developers
Integration@kya-os/bouncer-middlewareGateway (DNS) or Middleware (code)

Govern and Enforce are complementary. Use Enforce to protect your web application from unwanted bots, and Govern to authorize legitimate AI agents that need to interact with your APIs.

Dashboard

Manage Govern features from the Checkpoint dashboard:

  • Delegations — View and revoke active delegations
  • Proofs — Monitor verification activity and audit agent access
  • Control Access → Tools — Configure tool-level permissions
  • Control Access → Consent — Customize the consent page agents see
  • Control Access → Config — General Govern configuration

Next Steps