Console
Configure access policies, identity, and access control for your Keycard deployment.
Without centralized policy, teams fall back to approving every action manually or letting agents run unchecked. Console is where you replace that tradeoff with rules that enforce themselves. Author them in versioned sets, roll back to any previous state.
With Console, you can:
- Write permit/forbid policies that evaluate every request, with safe rollback to any previous version
- Bring your own IdP so users authenticate through Okta, Auth0, or Google
- Assign roles scoped to the organization or individual zones
- Add Gmail, GitHub, Slack, and other APIs from the Resource Catalog
- Install pre-configured MCP servers from the MCP Catalog, protected by your zone’s identity and policy layer
- Gate Console access behind your corporate SSO
Get Started
Section titled “Get Started”GET STARTED
Set up your identity provider, from app creation to first login.
Reference
Section titled “Reference”CONFIGURATION
Each area of Console with setup steps and examples.
Access PoliciesIndividual permit/forbid rules and policy sets that control access across a zoneIdentity ProvidersConnect your own OAuth 2.0 IdP for zone-level user authenticationZone AuthenticationConfiguring zone authentication, inviting users, sign up, and troubleshootingRoles & PermissionsOrganization and zone roles that control who can manage settings and resourcesSingle Sign-OnOIDC-based SSO for your team’s access to Keycard Console, with JIT provisioningResource CatalogPre-configured integrations for Gmail, GitHub, Slack, and more, ready to add to your zoneMCP CatalogInstall pre-configured MCP servers into Cursor, Claude Code, or any MCP client, protected by the Keycard MCP Gateway