Overview
AgenticOrg is an enterprise AI agent orchestration platform with 35 agents across 6 domains, connected to 54 enterprise systems via 340+ tools. It is live at agenticorg.ai. AgenticOrg agents call real APIs — Salesforce, Jira, HubSpot, SAP, S3, Gmail, Stripe, and 47 more. Each agent has a shared service account credential for each system. The challenge: how do you prevent an AP Processor agent from deleting contacts when it should only read invoices?The Problem
AgenticOrg’s 35 agents share the same underlying service account credentials for each connected system. The credentials themselves do not restrict what an agent can do:- Agent A (AP Processor) should only read invoices, not delete contacts
- Agent B (Sales Rep) should create leads, not approve payments
- Agent C (Recruiter) should post jobs, not terminate employees
How Grantex Solved It
AgenticOrg integrated Grantex as the authorization layer between agents and their tool connectors:- Agent creation — auto-registers on Grantex, gets a DID, tools mapped to scopes
- Human approves — Grantex issues an RS256-signed grant token with specific scopes
- Every tool call — Tool Gateway verifies the token, checks scopes against the manifest, then calls the connector
- Agent never sees the Salesforce/S3/Jira credentials — only the Grantex token
- Revoke a grant — agent immediately loses access across ALL connected systems
The Remaining Gap: Keyword Guessing
AgenticOrg’s initial Tool Gateway guessedread vs write from tool name keywords:
process_refundwas classified asreadbecause no keyword matchedfile_gstr3bwas classified asread(the word “file” as in “file a return” was not recognized)void_envelopewas classified asread(no “delete” keyword)- Any new tool defaulted to
readeven if it performed destructive operations
The Solution: Tool Manifests + enforce()
AgenticOrg replaced the keyword-guessing logic with Grantex’s pre-built manifests:Architecture
Results
“35 AI agents, 54 connectors, 340+ tools — all scope-enforced through one grantex.enforce() call per tool execution. The keyword-guessing approach misclassified 12% of our tools. With manifests, it is zero.”— AgenticOrg engineering team
| Metric | Before | After |
|---|---|---|
| Tool misclassification rate | 12% | 0% |
| Enforcement latency (p99) | N/A (keyword regex) | < 1ms |
| Permission coverage | ~60% of tools (others defaulted to read) | 100% of tools |
| Time to add a new connector | Write keyword regex + manual review | Load pre-built manifest (1 line) |
| Incident response (revoke access) | Per-connector credential rotation | Single grant revocation |
grantex.enforce() runs on every tool call in AgenticOrg’s production pipeline. The call decodes the JWT, resolves the permission from the manifest, and checks scope coverage — all in under 1 millisecond, with no network round-trip required for the manifest lookup.
Try It Yourself
-
Browse the manifests — see all 54 connectors and their tools:
-
Add enforcement to your agent — five lines of code:
- Read the full guide — Scope Enforcement