<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Blog</title>
    <link>https://www.gravitee.io/blog</link>
    <description>Read the latest from Gravitee on API management, API gateway, agentic AI, AI Agent Management, Event Streaming, the future of API &amp; agent-driven ecosystems</description>
    <language>en-us</language>
    <pubDate>Tue, 31 Mar 2026 08:41:52 GMT</pubDate>
    <dc:date>2026-03-31T08:41:52Z</dc:date>
    <dc:language>en-us</dc:language>
    <item>
      <title>88% of Companies Have Already Seen AI Agent Security Failures</title>
      <link>https://www.gravitee.io/blog/88-of-companies-have-already-seen-ai-agent-security-failures</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/88-of-companies-have-already-seen-ai-agent-security-failures" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/Title%20%281%29.png" alt="88% of Companies Have Already Seen AI Agent Security Failures" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h4&gt;&lt;span style="color: #434343;"&gt;What Real-World Failures Reveal About the Hidden Risks of AI Agents&lt;/span&gt;&lt;/h4&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;An overwhelming 88% of organizations report either confirmed or suspected AI agent security or privacy incidents within the last year.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/88-of-companies-have-already-seen-ai-agent-security-failures" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/Title%20%281%29.png" alt="88% of Companies Have Already Seen AI Agent Security Failures" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h4&gt;&lt;span style="color: #434343;"&gt;What Real-World Failures Reveal About the Hidden Risks of AI Agents&lt;/span&gt;&lt;/h4&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;An overwhelming 88% of organizations report either confirmed or suspected AI agent security or privacy incidents within the last year.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7600448&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.gravitee.io%2Fblog%2F88-of-companies-have-already-seen-ai-agent-security-failures&amp;amp;bu=https%253A%252F%252Fwww.gravitee.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AI Agent Management</category>
      <pubDate>Fri, 27 Mar 2026 05:06:08 GMT</pubDate>
      <guid>https://www.gravitee.io/blog/88-of-companies-have-already-seen-ai-agent-security-failures</guid>
      <dc:date>2026-03-27T05:06:08Z</dc:date>
      <dc:creator>Jorge Ruiz</dc:creator>
    </item>
    <item>
      <title>MCP Authorization: How to Manage Permissions for AI Agents &amp; Services</title>
      <link>https://www.gravitee.io/blog/mcp-authorization-how-to-manage-permissions-for-ai-agents-services</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/mcp-authorization-how-to-manage-permissions-for-ai-agents-services" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/MCP_Authorization_Feature.png" alt="MCP Authorization: How to Manage Permissions for AI Agents &amp;amp; Services" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Traditional IAM was built for humans and servers. Agentic AI introduces a third actor: the semi-autonomous agent that explores and interacts with tools dynamically. While our previous discussion on MCP Authentication focused on verifying who an agent is, that identity is useless without a robust framework for MCP Authorization to control what that agent is actually allowed to do.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/mcp-authorization-how-to-manage-permissions-for-ai-agents-services" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/MCP_Authorization_Feature.png" alt="MCP Authorization: How to Manage Permissions for AI Agents &amp;amp; Services" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Traditional IAM was built for humans and servers. Agentic AI introduces a third actor: the semi-autonomous agent that explores and interacts with tools dynamically. While our previous discussion on MCP Authentication focused on verifying who an agent is, that identity is useless without a robust framework for MCP Authorization to control what that agent is actually allowed to do.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7600448&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.gravitee.io%2Fblog%2Fmcp-authorization-how-to-manage-permissions-for-ai-agents-services&amp;amp;bu=https%253A%252F%252Fwww.gravitee.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Agentic IAM</category>
      <pubDate>Mon, 23 Feb 2026 19:05:56 GMT</pubDate>
      <guid>https://www.gravitee.io/blog/mcp-authorization-how-to-manage-permissions-for-ai-agents-services</guid>
      <dc:date>2026-02-23T19:05:56Z</dc:date>
      <dc:creator>Kay James</dc:creator>
    </item>
    <item>
      <title>MCP Authentication: The Complete Guide to Modern Credential Flow in AI Systems</title>
      <link>https://www.gravitee.io/blog/mcp-authentication-the-complete-guide-to-modern-credential-flow-in-ai-systems</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/mcp-authentication-the-complete-guide-to-modern-credential-flow-in-ai-systems" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/MCP_Auth_Feature.png" alt="MCP Authentication: The Complete Guide to Modern Credential Flow in AI Systems" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Static credentials are a liability in an autonomous world. When you hand an AI agent a "keys to the kingdom" API key, you’re granting access but also losing control. Modern architectures break when ownership and control are unclear.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/mcp-authentication-the-complete-guide-to-modern-credential-flow-in-ai-systems" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/MCP_Auth_Feature.png" alt="MCP Authentication: The Complete Guide to Modern Credential Flow in AI Systems" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Static credentials are a liability in an autonomous world. When you hand an AI agent a "keys to the kingdom" API key, you’re granting access but also losing control. Modern architectures break when ownership and control are unclear.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7600448&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.gravitee.io%2Fblog%2Fmcp-authentication-the-complete-guide-to-modern-credential-flow-in-ai-systems&amp;amp;bu=https%253A%252F%252Fwww.gravitee.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Agentic IAM</category>
      <pubDate>Mon, 23 Feb 2026 19:05:54 GMT</pubDate>
      <guid>https://www.gravitee.io/blog/mcp-authentication-the-complete-guide-to-modern-credential-flow-in-ai-systems</guid>
      <dc:date>2026-02-23T19:05:54Z</dc:date>
      <dc:creator>Kay James</dc:creator>
    </item>
    <item>
      <title>How AI Changes Authentication &amp; Authorization Models</title>
      <link>https://www.gravitee.io/blog/how-ai-changes-authentication-authorization-models</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/how-ai-changes-authentication-authorization-models" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/Blog%20-%20%20How%20Ai%20changes%20auth-1.png" alt="How AI Changes Authentication &amp;amp; Authorization Models" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Static API keys and human-only passwords cannot secure a world where AI agents act autonomously. Traditional authentication and authorization &amp;nbsp;models assume a human is at the keyboard, but 2026 architectures rely on machine-to-machine (M2M) intent.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/how-ai-changes-authentication-authorization-models" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/Blog%20-%20%20How%20Ai%20changes%20auth-1.png" alt="How AI Changes Authentication &amp;amp; Authorization Models" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Static API keys and human-only passwords cannot secure a world where AI agents act autonomously. Traditional authentication and authorization &amp;nbsp;models assume a human is at the keyboard, but 2026 architectures rely on machine-to-machine (M2M) intent.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7600448&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.gravitee.io%2Fblog%2Fhow-ai-changes-authentication-authorization-models&amp;amp;bu=https%253A%252F%252Fwww.gravitee.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Agentic IAM</category>
      <pubDate>Fri, 13 Feb 2026 14:28:30 GMT</pubDate>
      <guid>https://www.gravitee.io/blog/how-ai-changes-authentication-authorization-models</guid>
      <dc:date>2026-02-13T14:28:30Z</dc:date>
      <dc:creator>Kay James</dc:creator>
    </item>
    <item>
      <title>Gravitee in Gartner Market Guide for AI Gateways</title>
      <link>https://www.gravitee.io/blog/gravitee-in-gartner-market-guide-for-ai-gateways</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/gravitee-in-gartner-market-guide-for-ai-gateways" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/Title-1.png" alt="Gravitee in Gartner Market Guide for AI Gateways" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;At the end of last year, Gartner released the &lt;/span&gt;&lt;strong&gt;&lt;span&gt;2025 Market Guide for AI Gateways,&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; where Gravitee is recognized as a Representative Vendor in the category of &lt;/span&gt;&lt;strong&gt;&lt;span&gt;API Management Platforms Adding AI Extensions&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/gravitee-in-gartner-market-guide-for-ai-gateways" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/Title-1.png" alt="Gravitee in Gartner Market Guide for AI Gateways" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;At the end of last year, Gartner released the &lt;/span&gt;&lt;strong&gt;&lt;span&gt;2025 Market Guide for AI Gateways,&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; where Gravitee is recognized as a Representative Vendor in the category of &lt;/span&gt;&lt;strong&gt;&lt;span&gt;API Management Platforms Adding AI Extensions&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7600448&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.gravitee.io%2Fblog%2Fgravitee-in-gartner-market-guide-for-ai-gateways&amp;amp;bu=https%253A%252F%252Fwww.gravitee.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Agentic AI</category>
      <pubDate>Wed, 11 Feb 2026 18:38:45 GMT</pubDate>
      <author>linus.hakansson@graviteesource.com (Linus Håkansson)</author>
      <guid>https://www.gravitee.io/blog/gravitee-in-gartner-market-guide-for-ai-gateways</guid>
      <dc:date>2026-02-11T18:38:45Z</dc:date>
    </item>
    <item>
      <title>State of AI Agent Security 2026 Report: When Adoption Outpaces Control</title>
      <link>https://www.gravitee.io/blog/state-of-ai-agent-security-2026-report-when-adoption-outpaces-control</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/state-of-ai-agent-security-2026-report-when-adoption-outpaces-control" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/State_of_AA_Sec_Blog_Feature.png" alt="Results from 2026 State of AI Agent Security Report" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;We recently surveyed over 900 executives and technical practitioners to understand how organizations are managing the move toward autonomous systems. Today, we are releasing the results in &lt;/span&gt;&lt;strong&gt;&lt;span&gt;The State of AI Agent Security 2026 Report&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/state-of-ai-agent-security-2026-report-when-adoption-outpaces-control" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/State_of_AA_Sec_Blog_Feature.png" alt="Results from 2026 State of AI Agent Security Report" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;We recently surveyed over 900 executives and technical practitioners to understand how organizations are managing the move toward autonomous systems. Today, we are releasing the results in &lt;/span&gt;&lt;strong&gt;&lt;span&gt;The State of AI Agent Security 2026 Report&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7600448&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.gravitee.io%2Fblog%2Fstate-of-ai-agent-security-2026-report-when-adoption-outpaces-control&amp;amp;bu=https%253A%252F%252Fwww.gravitee.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Agentic IAM</category>
      <pubDate>Wed, 04 Feb 2026 15:39:13 GMT</pubDate>
      <guid>https://www.gravitee.io/blog/state-of-ai-agent-security-2026-report-when-adoption-outpaces-control</guid>
      <dc:date>2026-02-04T15:39:13Z</dc:date>
      <dc:creator>Jorge Ruiz</dc:creator>
    </item>
    <item>
      <title>Centralize MCP Authentication with MCP Server Application Types</title>
      <link>https://www.gravitee.io/blog/centralize-mcp-authentication-with-mcp-server-application</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/centralize-mcp-authentication-with-mcp-server-application" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/4.10_Centralize_MCP_Feature.png" alt="Centralize MCP Authentication with MCP Server Application Types" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: #000000;"&gt;Gravitee 4.10 introduces MCP Server applications&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;MCP servers are moving into real systems. Most teams still onboard them like experiments.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/centralize-mcp-authentication-with-mcp-server-application" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/4.10_Centralize_MCP_Feature.png" alt="Centralize MCP Authentication with MCP Server Application Types" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: #000000;"&gt;Gravitee 4.10 introduces MCP Server applications&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;MCP servers are moving into real systems. Most teams still onboard them like experiments.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7600448&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.gravitee.io%2Fblog%2Fcentralize-mcp-authentication-with-mcp-server-application&amp;amp;bu=https%253A%252F%252Fwww.gravitee.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AI Agent Management</category>
      <category>Agentic IAM</category>
      <pubDate>Thu, 22 Jan 2026 17:09:59 GMT</pubDate>
      <guid>https://www.gravitee.io/blog/centralize-mcp-authentication-with-mcp-server-application</guid>
      <dc:date>2026-01-22T17:09:59Z</dc:date>
      <dc:creator>Kay James</dc:creator>
    </item>
    <item>
      <title>Gravitee 4.10: One Control Point to Secure &amp; Govern AI Agents, MCP, and LLMs</title>
      <link>https://www.gravitee.io/blog/gravitee-4.10-one-control-point-to-secure-govern-ai-agents-mcp-and-llms</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/gravitee-4.10-one-control-point-to-secure-govern-ai-agents-mcp-and-llms" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/One_Control_Point_Feature.png" alt="Gravitee 4.10 Release: One Control Point to Secure &amp;amp; Govern AI Agents, MCP, and LLMs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;AI agents are already wired into real systems. They call LLMs, discover tools, and take actions that used to be locked behind human workflows. That shifts the problem from “Can we build an agent?” to “Can we control what the agent can see and do?”&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/gravitee-4.10-one-control-point-to-secure-govern-ai-agents-mcp-and-llms" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/One_Control_Point_Feature.png" alt="Gravitee 4.10 Release: One Control Point to Secure &amp;amp; Govern AI Agents, MCP, and LLMs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;AI agents are already wired into real systems. They call LLMs, discover tools, and take actions that used to be locked behind human workflows. That shifts the problem from “Can we build an agent?” to “Can we control what the agent can see and do?”&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7600448&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.gravitee.io%2Fblog%2Fgravitee-4.10-one-control-point-to-secure-govern-ai-agents-mcp-and-llms&amp;amp;bu=https%253A%252F%252Fwww.gravitee.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Platform release</category>
      <pubDate>Thu, 22 Jan 2026 16:29:40 GMT</pubDate>
      <guid>https://www.gravitee.io/blog/gravitee-4.10-one-control-point-to-secure-govern-ai-agents-mcp-and-llms</guid>
      <dc:date>2026-01-22T16:29:40Z</dc:date>
      <dc:creator>Jorge Ruiz</dc:creator>
    </item>
    <item>
      <title>MCP Proxy: Unified Governance for Agents Tools</title>
      <link>https://www.gravitee.io/blog/mcp-proxy-unified-governance-for-agents-tools</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/mcp-proxy-unified-governance-for-agents-tools" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/4.10_MCP_Proxy_Feature.png" alt="MCP Proxy: Unified Governance for Agents Tools" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;&lt;span style="font-weight: normal;"&gt;AI agents are moving fast. Governance is not.&lt;br&gt;&lt;/span&gt;&lt;br&gt;&lt;span style="font-weight: normal;"&gt;Teams are wiring agents to MCP servers to access tools, APIs, and data. That works, until every agent talks directly to every server. At that point, you lose control. You cannot see which tools are being called. You cannot restrict access cleanly. You cannot enforce authentication consistently. And you cannot explain what happens when something goes wrong.&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: normal;"&gt;Gravitee 4.10 fixes that.&lt;/span&gt;&lt;/p&gt; 
&lt;div class="hs-embed-wrapper" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0px; max-width: 256px; min-width: 256px; display: block; margin: auto;"&gt; 
 &lt;div class="hs-embed-content-wrapper"&gt; 
  &lt;div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.25%; margin: 0px;"&gt;  
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;&lt;span style="font-weight: normal;"&gt;In &lt;a href="https://www.gravitee.io/blog/llm-proxy-one-front-door-to-multiple-llm-providers"&gt;LLM Proxy&amp;nbsp; release blog&lt;/a&gt;, we discussed how agents use three paths to connect and interact with the world around them. One of the three paths is connecting to tools, normally through an MCP server. This release introduces the MCP proxy, a new AI gateway capability designed to secure, govern, and observe MCP traffic without changing how agents or MCP servers work.&lt;/span&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;span style="font-weight: bold;"&gt;What is the MCP Proxy?&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;An MCP proxy is a component that sits between MCP clients and MCP servers and mediates all communication between them.&lt;br&gt;&lt;br&gt;The proxy understands the MCP protocol and inspects requests at the method level, including tool discovery, tool execution, and prompt access.&lt;br&gt;&lt;br&gt;Because MCP is an RPC-based protocol, a generic HTTP proxy is not sufficient. An MCP proxy must parse and interpret the MCP payload to determine which operation is being invoked and apply controls based on that context.&lt;br&gt;&lt;br&gt;This design creates a single control point for MCP traffic. It avoids direct, point-to-point integrations between clients and servers, and enables centralized enforcement of authentication, authorization, policy evaluation, and observability across all MCP interactions.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;To make this concrete, the rest of this post uses a simple example. A hotel booking agent that helps users search hotels, view bookings, and manage reservations. The agent talks to LLMs through the LLM Proxy, and calls backend booking APIs through MCP.&lt;br&gt;&lt;br&gt;Each MCP policy below prevents a real problem that shows up when agents start calling booking tools in production.&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;What Ships in Gravitee 4.10&lt;/strong&gt;&lt;span style="font-size: 17px;"&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;Gravitee 4.10 introduces three core capabilities for MCP.&lt;/p&gt; 
&lt;h5 style="text-align: justify;"&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;1. A new MCP proxy API type&lt;/strong&gt;&lt;/span&gt;&lt;/h5&gt; 
&lt;p style="text-align: justify;"&gt;The &lt;a href="https://documentation.gravitee.io/apim/agent-mesh/secure-mcp-proxy-with-oauth2#create-the-mcp-proxy-api-in-apim"&gt;&lt;span&gt;MCP proxy&lt;/span&gt;&lt;/a&gt; is a new API type, purpose-built for MCP servers.&lt;br&gt;&lt;br&gt;It proxies upstream MCP servers, whether they are custom-built, third-party, or generated using Gravitee’s &lt;a href="https://youtu.be/VAl9G3yawf8"&gt;&lt;span&gt;MCP Tool Server&lt;/span&gt;&lt;/a&gt;. Because it understands the MCP protocol, it can apply gateway capabilities at the MCP operation level, not just at the connection level.&lt;br&gt;&lt;br&gt;That includes:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;MCP Analytics: Native analytics on tool calls, prompts, and errors&lt;/strong&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p style="text-align: justify;"&gt;MCP Proxy tracks and logs MCP-specific events such as tool calls, prompt requests, and errors. This gives teams visibility into how agents are using MCP servers in practice.&lt;br&gt;&lt;br&gt;You can answer questions like:&lt;/p&gt; 
&lt;ol style="list-style-type: lower-alpha;"&gt; 
 &lt;li&gt;Which tools are being called most often?&lt;/li&gt; 
 &lt;li&gt;Which prompts fail or error out?&lt;/li&gt; 
 &lt;li&gt;Which agents are generating the most MCP traffic?&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;A booking agent can search hotels, view bookings, and cancel reservations. Without visibility, teams cannot tell which tools the agent is actually using.&lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;Analytics show which booking tools are called most often and where failures happen.&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Caching: At the MCP Method Level&amp;nbsp;&lt;/strong&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Some MCP operations return repeatable results, such as metadata or tool listings.&lt;br&gt;&lt;br&gt;Because the proxy understands which MCP method is being invoked, the proxy layer can cache responses safely. This reduces unnecessary calls to MCP servers and improves response times for agents without changing server code. Caching happens at the MCP operation level, not at the HTTP layer.&lt;/p&gt; 
&lt;p&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;Agents often ask for the same information, like available booking tools or hotel metadata. Without caching, every agent hits the backend for the same answers. &lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;Caching avoids repeated calls and keeps booking tools responsive even during peak hours.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Rate limiting and retries based on MCP method behavior&lt;/strong&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p style="text-align: justify;"&gt;MCP traffic is not predictable. Some operations are lightweight. Others are expensive or sensitive. The MCP proxy applies rate limiting and retry logic with full awareness of MCP methods. Teams can protect MCP servers from overload.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;If an agent gets stuck and repeatedly calls a booking tool, it can overload the system. Rate limiting stops runaway calls before they affect real bookings. Other users can keep searching and booking without disruption.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;span style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;A short outage should not break a booking flow. If a tool fails, the proxy &lt;/span&gt;&lt;strong&gt;&lt;span style="color: #000000;"&gt;retries&lt;/span&gt;&lt;/strong&gt;&lt;span style="color: #000000;"&gt; automatically. The user keeps going instead of starting over.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Transform: Payload-aware transformations when needed&amp;nbsp;&lt;/strong&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p style="text-align: justify;"&gt;The MCP proxy can transform MCP requests and responses based on the invoked method.&lt;br&gt;&lt;br&gt;This allows teams to adapt inputs or outputs without modifying agents or MCP servers. Transformations apply only where they make sense, because the gateway knows exactly which MCP operation is in play.&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 16px; color: #000000;"&gt;Booking tools often expose internal details that users or external agents should not see. The proxy removes that internal metadata before returning results. Agents get only what they need to complete the booking.&lt;/span&gt;&lt;/p&gt; 
&lt;h5&gt;&lt;span style="font-size: 20px; font-weight: bold;"&gt;2. MCP ACL policy for fine-grained access control&lt;/span&gt;&lt;/h5&gt; Gravitee 4.10 adds a dedicated 
&lt;strong&gt;ACL policy&lt;/strong&gt; for MCP proxy APIs. This policy lets teams define access rules per MCP method. That includes protocol methods such as: 
&lt;br&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;span style="color: #188038;"&gt;tools/list&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #188038;"&gt;tool/call&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #188038;"&gt;prompts/list&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #188038;"&gt;resources/subscribe&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;And other MCP-native operations&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p style="text-align: justify;"&gt;You can decide which users or agents are allowed to discover tools, which tools they can call, and which MCP servers they can interact with at all.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 16px;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;span style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;Not every agent should access every booking tool. Some tools are public, like searching hotels. Others are private, like viewing or canceling bookings only for authenticated users.&lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;ACLs ensure agents only see and call the tools they are allowed to use.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h5 style="text-align: justify;"&gt;&lt;span style="font-size: 24px; font-weight: bold;"&gt;3. MCP Authorization, handled by the gateway&lt;/span&gt;&lt;/h5&gt; 
&lt;p style="text-align: justify;"&gt;MCP includes a formal authorization specification. Implementing it correctly is non-trivial, especially for server developers who just want to expose tools.&lt;br&gt;&lt;br&gt;Gravitee 4.10 offloads this work.&lt;br&gt;&lt;br&gt;The MCP proxy is compliant with the MCP authorization specification. When an MCP client connects without an access token, the gateway handles the flow. It redirects the client to the configured authorization server, where the end user can authenticate and grant consent.&lt;br&gt;&lt;br&gt;This is exactly how MCP clients expect secured servers to behave.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;&lt;br&gt;For developers, this means MCP servers no longer need to implement the authorization spec themselves. They delegate authentication and consent handling to the gateway, just like microservices delegate security concerns to an API gateway.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Viewing bookings requires knowing who the user is. If an agent connects without a token, the gateway handles login and consent. Booking tools only run after the user is authenticated.&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;How the MCP Proxy Helps Moving from Prototype to Production Faster&lt;/strong&gt;&lt;span style="font-size: 17px;"&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;Gravitee 4.10 treats MCP as a first-class citizen, not an edge case.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Developers ship faster by offloading auth, consent, and access control to the gateway.&lt;/li&gt; 
 &lt;li&gt;Platform teams get one place to govern MCP traffic instead of maintaining point-to-point agent integrations.&lt;/li&gt; 
 &lt;li&gt;Operations teams see tool calls, failures, and retries in real time, not after incidents.&lt;/li&gt; 
 &lt;li&gt;Security teams control which agents can discover and call MCP tools, down to the method level.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;Start Controlling MCP Before Agents Control You!&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;MCP turns tools into runtime capabilities. And that power needs control.&lt;br&gt;&lt;br&gt;The MCP proxy gives you visibility, access control, and standards-compliant authorization without changing how agents or servers are built. If you cannot control how agents use tools, you do not control your system.&lt;br&gt;&lt;br&gt;Explore the &lt;a href="https://www.gravitee.io/blog/gravitee-4.10-one-control-point-to-secure-govern-ai-agents-mcp-and-llms"&gt;Gravitee 4.10 release&lt;/a&gt;, head to the MCP proxy documentation and start proxying your MCP servers today.&lt;br&gt;&lt;br&gt;Ready to control and secure your MCP servers? Don’t hold back; &lt;a href="https://www.gravitee.io/demo"&gt;&lt;span style="font-weight: normal;"&gt;set up a call with one of our experts today&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: normal;"&gt;!&lt;/span&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/mcp-proxy-unified-governance-for-agents-tools" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/4.10_MCP_Proxy_Feature.png" alt="MCP Proxy: Unified Governance for Agents Tools" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;&lt;span style="font-weight: normal;"&gt;AI agents are moving fast. Governance is not.&lt;br&gt;&lt;/span&gt;&lt;br&gt;&lt;span style="font-weight: normal;"&gt;Teams are wiring agents to MCP servers to access tools, APIs, and data. That works, until every agent talks directly to every server. At that point, you lose control. You cannot see which tools are being called. You cannot restrict access cleanly. You cannot enforce authentication consistently. And you cannot explain what happens when something goes wrong.&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: normal;"&gt;Gravitee 4.10 fixes that.&lt;/span&gt;&lt;/p&gt; 
&lt;div class="hs-embed-wrapper" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0px; max-width: 256px; min-width: 256px; display: block; margin: auto;"&gt; 
 &lt;div class="hs-embed-content-wrapper"&gt; 
  &lt;div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.25%; margin: 0px;"&gt; 
   &lt;iframe width="256" height="144.64" src="https://www.youtube.com/embed/w5Ah1dEg-zE?feature=oembed" frameborder="0" allowfullscreen style="position: absolute; top: 0px; left: 0px; width: 100%; height: 100%; border: none;"&gt;&lt;/iframe&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;&lt;span style="font-weight: normal;"&gt;In &lt;a href="https://www.gravitee.io/blog/llm-proxy-one-front-door-to-multiple-llm-providers"&gt;LLM Proxy&amp;nbsp; release blog&lt;/a&gt;, we discussed how agents use three paths to connect and interact with the world around them. One of the three paths is connecting to tools, normally through an MCP server. This release introduces the MCP proxy, a new AI gateway capability designed to secure, govern, and observe MCP traffic without changing how agents or MCP servers work.&lt;/span&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;span style="font-weight: bold;"&gt;What is the MCP Proxy?&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;An MCP proxy is a component that sits between MCP clients and MCP servers and mediates all communication between them.&lt;br&gt;&lt;br&gt;The proxy understands the MCP protocol and inspects requests at the method level, including tool discovery, tool execution, and prompt access.&lt;br&gt;&lt;br&gt;Because MCP is an RPC-based protocol, a generic HTTP proxy is not sufficient. An MCP proxy must parse and interpret the MCP payload to determine which operation is being invoked and apply controls based on that context.&lt;br&gt;&lt;br&gt;This design creates a single control point for MCP traffic. It avoids direct, point-to-point integrations between clients and servers, and enables centralized enforcement of authentication, authorization, policy evaluation, and observability across all MCP interactions.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;To make this concrete, the rest of this post uses a simple example. A hotel booking agent that helps users search hotels, view bookings, and manage reservations. The agent talks to LLMs through the LLM Proxy, and calls backend booking APIs through MCP.&lt;br&gt;&lt;br&gt;Each MCP policy below prevents a real problem that shows up when agents start calling booking tools in production.&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;What Ships in Gravitee 4.10&lt;/strong&gt;&lt;span style="font-size: 17px;"&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;Gravitee 4.10 introduces three core capabilities for MCP.&lt;/p&gt; 
&lt;h5 style="text-align: justify;"&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;1. A new MCP proxy API type&lt;/strong&gt;&lt;/span&gt;&lt;/h5&gt; 
&lt;p style="text-align: justify;"&gt;The &lt;a href="https://documentation.gravitee.io/apim/agent-mesh/secure-mcp-proxy-with-oauth2#create-the-mcp-proxy-api-in-apim"&gt;&lt;span&gt;MCP proxy&lt;/span&gt;&lt;/a&gt; is a new API type, purpose-built for MCP servers.&lt;br&gt;&lt;br&gt;It proxies upstream MCP servers, whether they are custom-built, third-party, or generated using Gravitee’s &lt;a href="https://youtu.be/VAl9G3yawf8"&gt;&lt;span&gt;MCP Tool Server&lt;/span&gt;&lt;/a&gt;. Because it understands the MCP protocol, it can apply gateway capabilities at the MCP operation level, not just at the connection level.&lt;br&gt;&lt;br&gt;That includes:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;MCP Analytics: Native analytics on tool calls, prompts, and errors&lt;/strong&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p style="text-align: justify;"&gt;MCP Proxy tracks and logs MCP-specific events such as tool calls, prompt requests, and errors. This gives teams visibility into how agents are using MCP servers in practice.&lt;br&gt;&lt;br&gt;You can answer questions like:&lt;/p&gt; 
&lt;ol style="list-style-type: lower-alpha;"&gt; 
 &lt;li&gt;Which tools are being called most often?&lt;/li&gt; 
 &lt;li&gt;Which prompts fail or error out?&lt;/li&gt; 
 &lt;li&gt;Which agents are generating the most MCP traffic?&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;A booking agent can search hotels, view bookings, and cancel reservations. Without visibility, teams cannot tell which tools the agent is actually using.&lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;Analytics show which booking tools are called most often and where failures happen.&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Caching: At the MCP Method Level&amp;nbsp;&lt;/strong&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Some MCP operations return repeatable results, such as metadata or tool listings.&lt;br&gt;&lt;br&gt;Because the proxy understands which MCP method is being invoked, the proxy layer can cache responses safely. This reduces unnecessary calls to MCP servers and improves response times for agents without changing server code. Caching happens at the MCP operation level, not at the HTTP layer.&lt;/p&gt; 
&lt;p&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;Agents often ask for the same information, like available booking tools or hotel metadata. Without caching, every agent hits the backend for the same answers. &lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;Caching avoids repeated calls and keeps booking tools responsive even during peak hours.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Rate limiting and retries based on MCP method behavior&lt;/strong&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p style="text-align: justify;"&gt;MCP traffic is not predictable. Some operations are lightweight. Others are expensive or sensitive. The MCP proxy applies rate limiting and retry logic with full awareness of MCP methods. Teams can protect MCP servers from overload.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;If an agent gets stuck and repeatedly calls a booking tool, it can overload the system. Rate limiting stops runaway calls before they affect real bookings. Other users can keep searching and booking without disruption.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;span style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;A short outage should not break a booking flow. If a tool fails, the proxy &lt;/span&gt;&lt;strong&gt;&lt;span style="color: #000000;"&gt;retries&lt;/span&gt;&lt;/strong&gt;&lt;span style="color: #000000;"&gt; automatically. The user keeps going instead of starting over.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Transform: Payload-aware transformations when needed&amp;nbsp;&lt;/strong&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p style="text-align: justify;"&gt;The MCP proxy can transform MCP requests and responses based on the invoked method.&lt;br&gt;&lt;br&gt;This allows teams to adapt inputs or outputs without modifying agents or MCP servers. Transformations apply only where they make sense, because the gateway knows exactly which MCP operation is in play.&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 16px; color: #000000;"&gt;Booking tools often expose internal details that users or external agents should not see. The proxy removes that internal metadata before returning results. Agents get only what they need to complete the booking.&lt;/span&gt;&lt;/p&gt; 
&lt;h5&gt;&lt;span style="font-size: 20px; font-weight: bold;"&gt;2. MCP ACL policy for fine-grained access control&lt;/span&gt;&lt;/h5&gt; Gravitee 4.10 adds a dedicated 
&lt;strong&gt;ACL policy&lt;/strong&gt; for MCP proxy APIs. This policy lets teams define access rules per MCP method. That includes protocol methods such as: 
&lt;br&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;span style="color: #188038;"&gt;tools/list&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #188038;"&gt;tool/call&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #188038;"&gt;prompts/list&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #188038;"&gt;resources/subscribe&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;And other MCP-native operations&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p style="text-align: justify;"&gt;You can decide which users or agents are allowed to discover tools, which tools they can call, and which MCP servers they can interact with at all.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 16px;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;span style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;Not every agent should access every booking tool. Some tools are public, like searching hotels. Others are private, like viewing or canceling bookings only for authenticated users.&lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;ACLs ensure agents only see and call the tools they are allowed to use.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h5 style="text-align: justify;"&gt;&lt;span style="font-size: 24px; font-weight: bold;"&gt;3. MCP Authorization, handled by the gateway&lt;/span&gt;&lt;/h5&gt; 
&lt;p style="text-align: justify;"&gt;MCP includes a formal authorization specification. Implementing it correctly is non-trivial, especially for server developers who just want to expose tools.&lt;br&gt;&lt;br&gt;Gravitee 4.10 offloads this work.&lt;br&gt;&lt;br&gt;The MCP proxy is compliant with the MCP authorization specification. When an MCP client connects without an access token, the gateway handles the flow. It redirects the client to the configured authorization server, where the end user can authenticate and grant consent.&lt;br&gt;&lt;br&gt;This is exactly how MCP clients expect secured servers to behave.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;&lt;br&gt;For developers, this means MCP servers no longer need to implement the authorization spec themselves. They delegate authentication and consent handling to the gateway, just like microservices delegate security concerns to an API gateway.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Viewing bookings requires knowing who the user is. If an agent connects without a token, the gateway handles login and consent. Booking tools only run after the user is authenticated.&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;How the MCP Proxy Helps Moving from Prototype to Production Faster&lt;/strong&gt;&lt;span style="font-size: 17px;"&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;Gravitee 4.10 treats MCP as a first-class citizen, not an edge case.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Developers ship faster by offloading auth, consent, and access control to the gateway.&lt;/li&gt; 
 &lt;li&gt;Platform teams get one place to govern MCP traffic instead of maintaining point-to-point agent integrations.&lt;/li&gt; 
 &lt;li&gt;Operations teams see tool calls, failures, and retries in real time, not after incidents.&lt;/li&gt; 
 &lt;li&gt;Security teams control which agents can discover and call MCP tools, down to the method level.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;Start Controlling MCP Before Agents Control You!&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;MCP turns tools into runtime capabilities. And that power needs control.&lt;br&gt;&lt;br&gt;The MCP proxy gives you visibility, access control, and standards-compliant authorization without changing how agents or servers are built. If you cannot control how agents use tools, you do not control your system.&lt;br&gt;&lt;br&gt;Explore the &lt;a href="https://www.gravitee.io/blog/gravitee-4.10-one-control-point-to-secure-govern-ai-agents-mcp-and-llms"&gt;Gravitee 4.10 release&lt;/a&gt;, head to the MCP proxy documentation and start proxying your MCP servers today.&lt;br&gt;&lt;br&gt;Ready to control and secure your MCP servers? Don’t hold back; &lt;a href="https://www.gravitee.io/demo"&gt;&lt;span style="font-weight: normal;"&gt;set up a call with one of our experts today&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight: normal;"&gt;!&lt;/span&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7600448&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.gravitee.io%2Fblog%2Fmcp-proxy-unified-governance-for-agents-tools&amp;amp;bu=https%253A%252F%252Fwww.gravitee.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Platform release</category>
      <category>AI Agent Management</category>
      <pubDate>Thu, 22 Jan 2026 16:07:52 GMT</pubDate>
      <author>prachi.jamdade@graviteesource.com (Prachi Jamdade)</author>
      <guid>https://www.gravitee.io/blog/mcp-proxy-unified-governance-for-agents-tools</guid>
      <dc:date>2026-01-22T16:07:52Z</dc:date>
    </item>
    <item>
      <title>LLM Proxy: One Front Door to Multiple LLM Providers</title>
      <link>https://www.gravitee.io/blog/llm-proxy-one-front-door-to-multiple-llm-providers</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/llm-proxy-one-front-door-to-multiple-llm-providers" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/4.10_LLM_Proxy_Feature.png" alt="LLM Proxy: One Front Door to Multiple LLM Providers" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;As organizations move from simple generative AI to more advanced agentic systems, their infrastructure often starts to break. The problem isn’t just technical. It’s about ownership and control. When teams deploy AI models and agents without a clear central authority, they lose the ability to audit, secure, or even shut them down. That quickly becomes a serious risk.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Gravitee 4.10 introduces the &lt;strong&gt;AI Gateway&lt;/strong&gt; as a core pillar of the &lt;span style="font-weight: bold;"&gt;AI &lt;/span&gt;&lt;strong&gt;Agent Management Platform (AMP)&lt;/strong&gt;, designed to control how agents interact with the world around them. Agents follow three critical paths: &lt;strong&gt;talking to other agents, calling tools, and invoking LLMs&lt;/strong&gt;. This release marks a significant evolution from our previous Agent Mesh to a comprehensive platform designed to govern the entire lifecycle of AI agents in one place.&lt;/p&gt; 
&lt;div class="hs-embed-wrapper" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0px; max-width: 256px; min-width: 256px; display: block; margin: auto;"&gt; 
 &lt;div class="hs-embed-content-wrapper"&gt; 
  &lt;div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.25%; margin: 0px;"&gt;  
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;With 4.10, Gravitee brings these three paths under one gateway. The release ships &lt;strong&gt;LLM Proxy&lt;/strong&gt; and &lt;strong&gt;MCP Proxy&lt;/strong&gt;, giving teams a controlled front door to LLM providers and agent tools. This builds on the A2A Proxy, introduced in 4.8, which already governs agent-to-agent communication. &lt;strong&gt;Together, these proxies form the AI Gateway, a single control plane to secure, govern, and observe every interaction agents make, before sprawl and risk take over.&lt;/strong&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;But… Why Does LLM Access Breaks Down at Scale?&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;Early GenAI integrations are simple. One app. One LLM provider. One API key.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;That model collapses as soon as AI becomes shared infrastructure.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Teams connect agents directly to providers. Each integration becomes point-to-point. There is no global visibility into which models are used, how often, or at what cost. Switching providers means refactoring code. Enforcing security or compliance rules for every individual team.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;This is the same failure pattern APIs went through a decade ago. AI needs the same gateway discipline.&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;What is the LLM Proxy?&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;This release introduces a new &lt;a href="https://documentation.gravitee.io/apim/agent-mesh/llm-proxy/proxy-your-llms"&gt;&lt;strong&gt;&lt;span&gt;LLM Proxy API type&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;, built to sit between your AI consumers, such as agents or applications, and your LLM providers. It gives enterprises &lt;strong&gt;one control point for model access, security, routing, and cost management&lt;/strong&gt;, without forcing developers to write business logic for all this.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;&lt;br&gt;The LLM Proxy acts as an &lt;strong&gt;intelligent middleware layer&lt;/strong&gt;. It abstracts the complexity of multiple providers such as OpenAI, Gemini, Bedrock and OpenAI-compatible APIs like Ollama, Together AI, Local AI and Mistral AI into a single, unified interface. With additional providers added over time without requiring changes to consumer integrations.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;To make this concrete, the rest of this post uses a simple example. A hotel booking agent that helps users search hotels, view bookings, and manage reservations. The agent talks to LLMs through the LLM Proxy, and calls backend booking APIs through MCP.&lt;br&gt;Each policy below exists to prevent a specific failure that shows up when a hotel booking agent runs in production.&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;What Ships in Gravitee 4.10&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;Gravitee 4.10 lays the foundation for enterprise-grade LLM governance with a focused feature set.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;1. LLM Analytics: &lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Provides out-of-the-box analytics in Elasticsearch showing which models are being consumed, token usage, and associated costs, assuming cost metrics are configured. An in-app analytics dashboard will follow in the next release.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;A hotel booking agent handles search queries, booking confirmations, and customer support questions. Without analytics, teams cannot see which interactions consume the most tokens or which models drive cost.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;LLM analytics expose exactly where spend comes from and which agent flows are responsible.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;2. &lt;a href="https://documentation.gravitee.io/apim/agent-mesh/llm-proxy/add-the-token-rate-limit-policy-to-your-llm-proxy"&gt;Token rate limiting&lt;/a&gt;:&lt;/p&gt; 
&lt;p&gt;Enforces quotas based on input and output tokens per LLM invocation. When limits are reached, requests fail, protecting budgets and ensuring fair usage and service quality.&lt;/p&gt; 
&lt;p&gt;&lt;span style="text-align: justify; background-color: transparent;"&gt;For example - Hotel search traffic spikes during peak travel periods. If one agent starts generating long responses or looping on retries, it can consume the entire token budget.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;Token rate limits ensure search, booking, and support workflows all get fair access to LLM capacity.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Here, we set the limit of 10000 tokens every 5 minutes.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;3. Role Based Access Control: &lt;/strong&gt;&lt;/p&gt; Controls which teams, agents, or applications can access the LLM proxy and which models they are allowed to use, enforcing consistent access policies across all LLM traffic. 
&lt;br&gt; 
&lt;p style="text-align: justify;"&gt;Not every agent needs the same models. Customer-facing chat requires high-quality responses, while internal booking automation does not need high-quality models.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;RBAC ensures each agent uses only the models it actually needs, keeping costs predictable and access controlled.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;4. Provider &amp;amp; model routing: &lt;/strong&gt;Automatically routes requests to the correct LLM provider and model based on consumer requests, without requiring changes to client code.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Most hotel searches tolerate lower-cost models. Booking confirmations and cancellations do not.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Model routing automatically sends critical booking steps to the most reliable model, without changing agent logic.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;5. &lt;/strong&gt;&lt;strong&gt;&lt;a href="https://documentation.gravitee.io/apim/agent-mesh/llm-proxy/add-the-guard-rails-policy-to-your-llm-proxy"&gt;Guardrails&lt;/a&gt;: &lt;/strong&gt;Prevent agents or consumers from sending unsafe, non-compliant, or policy-violating prompts to LLMs by enforcing guardrails at the gateway.&lt;/p&gt; 
&lt;p&gt;&lt;span style="text-align: justify; background-color: transparent;"&gt;When an agent submits a prompt containing harmful, obscene, or exploitative language, the LLM Proxy detects it at runtime and rejects the request before forwarding it to the provider.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;A public hotel booking interface accepts natural language input from anyone. Without guardrails, abusive or unsafe prompts reach the LLM directly. &lt;br&gt;&lt;br&gt;Guardrails block these requests before they ever reach a model, protecting both users and the brand reputation.&lt;/p&gt; 
&lt;strong&gt;6. API key sharing: &lt;/strong&gt;Centralizes and abstracts provider API keys at the gateway level so consumers never embed or manage provider credentials directly. 
&lt;br&gt; 
&lt;p style="text-align: justify;"&gt;Instead of dozens of OpenAI keys embedded across codebases, agents authenticate through a single gateway-managed API key, protected by Gravitee API keys or OAuth for an added security layer.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;A hotel platform often runs multiple agents across environments. Embedding provider API keys in each agent quickly becomes unmanageable and insecure.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Centralized and shared key management keeps credentials secure, out-of-code and allows rotation without redeploying agents.&lt;/p&gt; 
&lt;strong&gt;7. Transform: &lt;/strong&gt;Automatically maps OpenAI compatible requests to provider-specific formats and transforms responses back to a consistent interface for consumers. 
&lt;br&gt; 
&lt;p style="text-align: justify;"&gt;An agent sends an OpenAI-style request, and the gateway automatically converts it to Bedrock or Gemini format and normalizes the response back.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Agents speak a single, consistent LLM interface. But LLM providers do not. Request and response transformation lets the booking agent stay provider-agnostic while the gateway adapts traffic behind the scenes.&lt;/p&gt; 
&lt;strong&gt;8. Retry: &lt;/strong&gt;Automatically retries failed LLM requests when a provider has a temporary issue, so agents do not need to handle retries themselves 
&lt;br&gt; 
&lt;p style="text-align: justify;"&gt;A short LLM outage should not break a hotel booking workflow. That would affect the user experience. If something fails briefly, the gateway retries automatically and the user keeps going.&lt;/p&gt; 
&lt;strong&gt;9. Model governance: &lt;/strong&gt;Defines which LLM providers and models are available within the organization, enabling controlled rollout, model approval, and easier provider switching to reduce vendor lock-in. 
&lt;br&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;Booking confirmations should not change behavior overnight. Model governance lets teams test new models on search questions first, then use them for bookings only when they are proven.&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;Key Benefits for the Whole Organization&lt;/strong&gt;&lt;/h2&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Engineers and developers:&lt;/strong&gt; No provider-specific code. Easy model switches.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Platform and IT teams: &lt;/strong&gt;&lt;span style="background-color: transparent;"&gt;Centralized access control, rate limits, and API key management.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Security teams: &lt;/strong&gt;&lt;span style="background-color: transparent;"&gt;Full visibility into LLM usage. Enforce which models agents can access.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Data and AI teams: &lt;/strong&gt;&lt;span style="background-color: transparent;"&gt;One entry point to multiple LLMs. Compare and change models without rewrites.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Business leaders: &lt;/strong&gt;&lt;span style="background-color: transparent;"&gt;Clear insight into LLM usage and costs. Predictable spend and future pricing control.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;Start Controlling Your LLM Traffic Today!&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;The LLM Proxy in Gravitee 4.10 lets teams scale AI through a single, governed entry point to multiple LLM providers, giving developers speed while restoring visibility, control, and cost clarity. &lt;br&gt;&lt;br&gt;This is not about adding another AI abstraction. It is about applying proven gateway principles to the most sensitive part of the AI stack.&lt;br&gt;&lt;br&gt;As Gartner highlights, “34% of top-performing organizations in building AI-powered solutions use AI gateways compared to just 8% of lower performers.” in Gartner’s 2025 AI in Software Engineering Survey. &lt;br&gt;&lt;br&gt;If AI is becoming core infrastructure, it deserves infrastructure-grade controls. Gravitee 4.10 delivers exactly that.&amp;nbsp;&lt;br&gt;&lt;br&gt;Want to start managing your LLMs?&amp;nbsp;Don’t hold back; &lt;a href="https://www.gravitee.io/demo"&gt;&lt;span style="font-weight: normal;"&gt;set up a call with one of our experts today &lt;/span&gt;&lt;/a&gt;to see how Gravitee's AI Gateway help you achieve this.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.gravitee.io/blog/llm-proxy-one-front-door-to-multiple-llm-providers" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.gravitee.io/hubfs/4.10_LLM_Proxy_Feature.png" alt="LLM Proxy: One Front Door to Multiple LLM Providers" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;As organizations move from simple generative AI to more advanced agentic systems, their infrastructure often starts to break. The problem isn’t just technical. It’s about ownership and control. When teams deploy AI models and agents without a clear central authority, they lose the ability to audit, secure, or even shut them down. That quickly becomes a serious risk.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Gravitee 4.10 introduces the &lt;strong&gt;AI Gateway&lt;/strong&gt; as a core pillar of the &lt;span style="font-weight: bold;"&gt;AI &lt;/span&gt;&lt;strong&gt;Agent Management Platform (AMP)&lt;/strong&gt;, designed to control how agents interact with the world around them. Agents follow three critical paths: &lt;strong&gt;talking to other agents, calling tools, and invoking LLMs&lt;/strong&gt;. This release marks a significant evolution from our previous Agent Mesh to a comprehensive platform designed to govern the entire lifecycle of AI agents in one place.&lt;/p&gt; 
&lt;div class="hs-embed-wrapper" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0px; max-width: 256px; min-width: 256px; display: block; margin: auto;"&gt; 
 &lt;div class="hs-embed-content-wrapper"&gt; 
  &lt;div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.25%; margin: 0px;"&gt; 
   &lt;iframe width="256" height="144.64" src="https://www.youtube.com/embed/rLuKZQtG3ME?feature=oembed" frameborder="0" allowfullscreen style="position: absolute; top: 0px; left: 0px; width: 100%; height: 100%; border: none;"&gt;&lt;/iframe&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify;"&gt;With 4.10, Gravitee brings these three paths under one gateway. The release ships &lt;strong&gt;LLM Proxy&lt;/strong&gt; and &lt;strong&gt;MCP Proxy&lt;/strong&gt;, giving teams a controlled front door to LLM providers and agent tools. This builds on the A2A Proxy, introduced in 4.8, which already governs agent-to-agent communication. &lt;strong&gt;Together, these proxies form the AI Gateway, a single control plane to secure, govern, and observe every interaction agents make, before sprawl and risk take over.&lt;/strong&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;But… Why Does LLM Access Breaks Down at Scale?&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;Early GenAI integrations are simple. One app. One LLM provider. One API key.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;That model collapses as soon as AI becomes shared infrastructure.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Teams connect agents directly to providers. Each integration becomes point-to-point. There is no global visibility into which models are used, how often, or at what cost. Switching providers means refactoring code. Enforcing security or compliance rules for every individual team.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;This is the same failure pattern APIs went through a decade ago. AI needs the same gateway discipline.&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;What is the LLM Proxy?&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;This release introduces a new &lt;a href="https://documentation.gravitee.io/apim/agent-mesh/llm-proxy/proxy-your-llms"&gt;&lt;strong&gt;&lt;span&gt;LLM Proxy API type&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;, built to sit between your AI consumers, such as agents or applications, and your LLM providers. It gives enterprises &lt;strong&gt;one control point for model access, security, routing, and cost management&lt;/strong&gt;, without forcing developers to write business logic for all this.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;&lt;br&gt;The LLM Proxy acts as an &lt;strong&gt;intelligent middleware layer&lt;/strong&gt;. It abstracts the complexity of multiple providers such as OpenAI, Gemini, Bedrock and OpenAI-compatible APIs like Ollama, Together AI, Local AI and Mistral AI into a single, unified interface. With additional providers added over time without requiring changes to consumer integrations.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;To make this concrete, the rest of this post uses a simple example. A hotel booking agent that helps users search hotels, view bookings, and manage reservations. The agent talks to LLMs through the LLM Proxy, and calls backend booking APIs through MCP.&lt;br&gt;Each policy below exists to prevent a specific failure that shows up when a hotel booking agent runs in production.&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;What Ships in Gravitee 4.10&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;Gravitee 4.10 lays the foundation for enterprise-grade LLM governance with a focused feature set.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;1. LLM Analytics: &lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Provides out-of-the-box analytics in Elasticsearch showing which models are being consumed, token usage, and associated costs, assuming cost metrics are configured. An in-app analytics dashboard will follow in the next release.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;A hotel booking agent handles search queries, booking confirmations, and customer support questions. Without analytics, teams cannot see which interactions consume the most tokens or which models drive cost.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;LLM analytics expose exactly where spend comes from and which agent flows are responsible.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;2. &lt;a href="https://documentation.gravitee.io/apim/agent-mesh/llm-proxy/add-the-token-rate-limit-policy-to-your-llm-proxy"&gt;Token rate limiting&lt;/a&gt;:&lt;/p&gt; 
&lt;p&gt;Enforces quotas based on input and output tokens per LLM invocation. When limits are reached, requests fail, protecting budgets and ensuring fair usage and service quality.&lt;/p&gt; 
&lt;p&gt;&lt;span style="text-align: justify; background-color: transparent;"&gt;For example - Hotel search traffic spikes during peak travel periods. If one agent starts generating long responses or looping on retries, it can consume the entire token budget.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;Token rate limits ensure search, booking, and support workflows all get fair access to LLM capacity.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Here, we set the limit of 10000 tokens every 5 minutes.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;3. Role Based Access Control: &lt;/strong&gt;&lt;/p&gt; Controls which teams, agents, or applications can access the LLM proxy and which models they are allowed to use, enforcing consistent access policies across all LLM traffic. 
&lt;br&gt; 
&lt;p style="text-align: justify;"&gt;Not every agent needs the same models. Customer-facing chat requires high-quality responses, while internal booking automation does not need high-quality models.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;RBAC ensures each agent uses only the models it actually needs, keeping costs predictable and access controlled.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;4. Provider &amp;amp; model routing: &lt;/strong&gt;Automatically routes requests to the correct LLM provider and model based on consumer requests, without requiring changes to client code.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Most hotel searches tolerate lower-cost models. Booking confirmations and cancellations do not.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Model routing automatically sends critical booking steps to the most reliable model, without changing agent logic.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;5. &lt;/strong&gt;&lt;strong&gt;&lt;a href="https://documentation.gravitee.io/apim/agent-mesh/llm-proxy/add-the-guard-rails-policy-to-your-llm-proxy"&gt;Guardrails&lt;/a&gt;: &lt;/strong&gt;Prevent agents or consumers from sending unsafe, non-compliant, or policy-violating prompts to LLMs by enforcing guardrails at the gateway.&lt;/p&gt; 
&lt;p&gt;&lt;span style="text-align: justify; background-color: transparent;"&gt;When an agent submits a prompt containing harmful, obscene, or exploitative language, the LLM Proxy detects it at runtime and rejects the request before forwarding it to the provider.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;A public hotel booking interface accepts natural language input from anyone. Without guardrails, abusive or unsafe prompts reach the LLM directly. &lt;br&gt;&lt;br&gt;Guardrails block these requests before they ever reach a model, protecting both users and the brand reputation.&lt;/p&gt; 
&lt;strong&gt;6. API key sharing: &lt;/strong&gt;Centralizes and abstracts provider API keys at the gateway level so consumers never embed or manage provider credentials directly. 
&lt;br&gt; 
&lt;p style="text-align: justify;"&gt;Instead of dozens of OpenAI keys embedded across codebases, agents authenticate through a single gateway-managed API key, protected by Gravitee API keys or OAuth for an added security layer.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;A hotel platform often runs multiple agents across environments. Embedding provider API keys in each agent quickly becomes unmanageable and insecure.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Centralized and shared key management keeps credentials secure, out-of-code and allows rotation without redeploying agents.&lt;/p&gt; 
&lt;strong&gt;7. Transform: &lt;/strong&gt;Automatically maps OpenAI compatible requests to provider-specific formats and transforms responses back to a consistent interface for consumers. 
&lt;br&gt; 
&lt;p style="text-align: justify;"&gt;An agent sends an OpenAI-style request, and the gateway automatically converts it to Bedrock or Gemini format and normalizes the response back.&lt;/p&gt; 
&lt;p style="text-align: justify;"&gt;Agents speak a single, consistent LLM interface. But LLM providers do not. Request and response transformation lets the booking agent stay provider-agnostic while the gateway adapts traffic behind the scenes.&lt;/p&gt; 
&lt;strong&gt;8. Retry: &lt;/strong&gt;Automatically retries failed LLM requests when a provider has a temporary issue, so agents do not need to handle retries themselves 
&lt;br&gt; 
&lt;p style="text-align: justify;"&gt;A short LLM outage should not break a hotel booking workflow. That would affect the user experience. If something fails briefly, the gateway retries automatically and the user keeps going.&lt;/p&gt; 
&lt;strong&gt;9. Model governance: &lt;/strong&gt;Defines which LLM providers and models are available within the organization, enabling controlled rollout, model approval, and easier provider switching to reduce vendor lock-in. 
&lt;br&gt; 
&lt;p style="text-align: justify;"&gt;&lt;br&gt;Booking confirmations should not change behavior overnight. Model governance lets teams test new models on search questions first, then use them for bookings only when they are proven.&lt;/p&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;Key Benefits for the Whole Organization&lt;/strong&gt;&lt;/h2&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Engineers and developers:&lt;/strong&gt; No provider-specific code. Easy model switches.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Platform and IT teams: &lt;/strong&gt;&lt;span style="background-color: transparent;"&gt;Centralized access control, rate limits, and API key management.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Security teams: &lt;/strong&gt;&lt;span style="background-color: transparent;"&gt;Full visibility into LLM usage. Enforce which models agents can access.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Data and AI teams: &lt;/strong&gt;&lt;span style="background-color: transparent;"&gt;One entry point to multiple LLMs. Compare and change models without rewrites.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Business leaders: &lt;/strong&gt;&lt;span style="background-color: transparent;"&gt;Clear insight into LLM usage and costs. Predictable spend and future pricing control.&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2 style="text-align: justify;"&gt;&lt;strong&gt;Start Controlling Your LLM Traffic Today!&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="text-align: justify;"&gt;The LLM Proxy in Gravitee 4.10 lets teams scale AI through a single, governed entry point to multiple LLM providers, giving developers speed while restoring visibility, control, and cost clarity. &lt;br&gt;&lt;br&gt;This is not about adding another AI abstraction. It is about applying proven gateway principles to the most sensitive part of the AI stack.&lt;br&gt;&lt;br&gt;As Gartner highlights, “34% of top-performing organizations in building AI-powered solutions use AI gateways compared to just 8% of lower performers.” in Gartner’s 2025 AI in Software Engineering Survey. &lt;br&gt;&lt;br&gt;If AI is becoming core infrastructure, it deserves infrastructure-grade controls. Gravitee 4.10 delivers exactly that.&amp;nbsp;&lt;br&gt;&lt;br&gt;Want to start managing your LLMs?&amp;nbsp;Don’t hold back; &lt;a href="https://www.gravitee.io/demo"&gt;&lt;span style="font-weight: normal;"&gt;set up a call with one of our experts today &lt;/span&gt;&lt;/a&gt;to see how Gravitee's AI Gateway help you achieve this.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=7600448&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.gravitee.io%2Fblog%2Fllm-proxy-one-front-door-to-multiple-llm-providers&amp;amp;bu=https%253A%252F%252Fwww.gravitee.io%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Platform release</category>
      <category>AI Agent Management</category>
      <pubDate>Thu, 22 Jan 2026 16:04:15 GMT</pubDate>
      <author>prachi.jamdade@graviteesource.com (Prachi Jamdade)</author>
      <guid>https://www.gravitee.io/blog/llm-proxy-one-front-door-to-multiple-llm-providers</guid>
      <dc:date>2026-01-22T16:04:15Z</dc:date>
    </item>
  </channel>
</rss>
