
Imperdiet faucibus ornare quis mus lorem a amet. Pulvinar diam lacinia diam semper ac dignissim tellus dolor purus in nibh pellentesque. Nisl luctus amet in ut ultricies orci faucibus sed euismod suspendisse cum eu massa. Facilisis suspendisse at morbi ut faucibus eget lacus quam nulla vel vestibulum sit vehicula. Nisi nullam sit viverra vitae. Sed consequat semper leo enim nunc.
Lacus sit dui posuere bibendum aliquet tempus. Amet pellentesque augue non lacus. Arcu tempor lectus elit ullamcorper nunc. Proin euismod ac pellentesque nec id convallis pellentesque semper. Convallis curabitur quam scelerisque cursus pharetra. Nam duis sagittis interdum odio nulla interdum aliquam at. Et varius tempor risus facilisi auctor malesuada diam. Sit viverra enim maecenas mi. Id augue non proin lectus consectetur odio consequat id vestibulum. Ipsum amet neque id augue cras auctor velit eget. Quisque scelerisque sit elit iaculis a.

Amet pellentesque augue non lacus. Arcu tempor lectus elit ullamcorper nunc. Proin euismod ac pellentesque nec id convallis pellentesque semper. Convallis curabitur quam scelerisque cursus pharetra. Nam duis sagittis interdum odio nulla interdum aliquam at. Et varius tempor risus facilisi auctor malesuada diam. Sit viverra enim maecenas mi. Id augue non proin lectus consectetur odio consequat id vestibulum. Ipsum amet neque id augue cras auctor velit eget.
Massa dui enim fermentum nunc purus viverra suspendisse risus tincidunt pulvinar a aliquam pharetra habitasse ullamcorper sed et egestas imperdiet nisi ultrices eget id. Mi non sed dictumst elementum varius lacus scelerisque et pellentesque at enim et leo. Tortor etiam amet tellus aliquet nunc eros ultrices nunc a ipsum orci integer ipsum a mus. Orci est tellus diam nec faucibus. Sociis pellentesque velit eget convallis pretium morbi vel.
Eget aliquam vivamus congue nam quam dui in. Condimentum proin eu urna eget pellentesque tortor. Gravida pellentesque dignissim nisi mollis magna venenatis adipiscing natoque urna tincidunt eleifend id. Sociis arcu viverra velit ut quam libero ultricies facilisis duis. Montes suscipit ut suscipit quam erat nunc mauris nunc enim. Vel et morbi ornare ullamcorper imperdiet.
Today, we're excited to announce that Operant AI's MCP Gateway is officially available on the Okta Integration Network (OIN) — bringing enterprise-grade identity controls to the Model Context Protocol layer for the first time. This milestone means organizations already running Okta can now connect Operant's MCP Gateway in just a few clicks, layering powerful AI runtime security directly on top of the identity fabric they already trust.

Model Context Protocol (MCP) is quickly becoming the de facto standard for how AI agents — from coding assistants to autonomous workflows — connect to external tools, APIs, and data sources. If you've been paying attention to the agentic AI space over the past year, you've watched MCP adoption explode across development teams, AI platforms, and enterprise toolchains alike.
But with that adoption has come a growing and underappreciated risk: MCP servers are a new, largely uncontrolled attack surface. They sit between your AI agents and your most sensitive business systems — databases, APIs, SaaS tools, internal services — and yet most organizations have no consistent way to enforce identity and authorization, audit access, or detect abuse at this layer.
That's exactly the problem Operant's MCP Gateway was built to solve. And by joining the Okta Integration Network, we're making it dramatically easier for security teams to extend the identity controls they've already invested in directly into their MCP infrastructure.
For those new to the OIN, here's the quick version: the Okta Integration Network is one of the most extensive pre-built integration ecosystems in enterprise identity. With over 8,000 ready-to-use integrations, the OIN allows organizations to connect their critical applications and security tools to Okta's identity platform without custom development work.
The OIN isn't just a catalog. It's an endorsement. Integrations listed in the OIN are tested, vetted, and built to Okta's standards — which means IT and security teams can deploy them with confidence, knowing they'll interoperate cleanly with Okta's SSO, adaptive MFA, lifecycle management, and identity governance capabilities.
For Okta customers, the OIN is often the first place security architects look when they're evaluating new tools. It shortens vendor procurement cycles, reduces integration risk, and means teams spend less time on plumbing and more time on actual security outcomes.
Being listed in the OIN is a signal to enterprise security leaders that a product meets the bar required to operate inside a mature identity ecosystem. We're proud to have met that bar.
The Operant MCP Gateway acts as a security control plane for MCP traffic — inspecting, enforcing, and auditing every interaction between AI agents and the tools and data sources they're authorized (or not authorized) to access.
With the Okta integration now live, joint customers can:
Enforce identity-aware access to MCP servers. The MCP Gateway integrates with Okta's identity layer to verify that the agent or user initiating an MCP request is who they claim to be — and that they're operating within the bounds of their assigned permissions. No more anonymous or weakly-authenticated agent calls hitting your internal APIs.
Extend Okta’s Identity Plane with MCP Gateway’s Runtime and Intent-Aware Authorization. With MCP Gateway in the Okta Integration Network, Okta enforces identity assurance, MFA, scopes, groups, device posture, and risk signals at authentication, establishing trusted session boundaries. MCP Gateway then extends those identity claims into a continuous, runtime authorization plane by enforcing least-privilege, context-aware, and intent-based controls on every MCP tool invocation, dynamically evaluating privilege tier, execution patterns, and behavioral risk to prevent escalation and out-of-scope access.
Centralize audit and observability. Every MCP tool call, resource access, and prompt interaction is logged through the Gateway and can be correlated with Okta identity context. Security teams gain a clear, auditable record of what agents accessed, when, and under what authorization — a critical requirement for compliance and incident response.
Reduce the blast radius of compromised agents. By pairing Operant's runtime enforcement with Okta's lifecycle management capabilities, teams can scope agent permissions tightly, revoke access instantly when something looks wrong, and prevent lateral movement in the event of an agent compromise.
We built Operant's MCP Gateway because we saw organizations deploying AI agents into production with essentially no runtime security controls at the MCP layer. The agents were smart. The guardrails weren't.
Joining the OIN means security and identity teams don't have to choose between moving fast and staying secure. If your organization already uses Okta — and roughly 19,000 organizations worldwide do — you can add MCP-level security controls to your existing identity stack today, without a long integration project.
This is especially timely. As enterprises move from experimenting with AI copilots to deploying autonomous agents that take real actions in real systems, the stakes around access control and auditability have never been higher. Regulators are beginning to ask hard questions about how AI agents are authorized and logged. CISOs are being asked to sign off on agentic workflows that their existing security tooling was never designed to monitor.
The Operant + Okta integration is a direct answer to those challenges.
This OIN listing is the first step in a deeper partnership between Operant AI and Okta. We're actively working on additional integration capabilities, including tighter support for Okta's Identity Threat Protection signals and expanded lifecycle management workflows for non-human identities in agentic pipelines.
If you're at an organization actively deploying MCP-based AI agents — or evaluating whether to — we'd love to show you how the MCP Gateway and Okta work together in practice.
Find Operant AI in the Okta Integration Network → Operant MCP Gateway on OIN
Learn more about Operant's MCP Gateway -> MCP Gateway
Request a demo → operant.ai/demo
Operant AI is the runtime security platform for AI agents and applications. The Operant MCP Gateway provides identity-aware access control, real-time threat detection, and full auditability for MCP-based AI agent infrastructure.