Adding tutorials for integrating Asgardeo with KONG and WSO2 AI Gateways for agent identity management#5882
Adding tutorials for integrating Asgardeo with KONG and WSO2 AI Gateways for agent identity management#5882AkinduH wants to merge 36 commits intowso2:masterfrom
Conversation
|
Note Reviews pausedIt looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the Use the following commands to manage reviews:
Use the checkboxes below for quick actions:
WalkthroughAdds two tutorial pages and corresponding include files documenting integration patterns between Asgardeo and the Kong and WSO2 AI Gateways for agent identity-aware access control (architecture, Asgardeo setup, gateway configuration, and verification). Changes
Sequence Diagram(s)mermaid Estimated code review effort🎯 3 (Moderate) | ⏱️ ~25 minutes Poem
🚥 Pre-merge checks | ✅ 2 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (2 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Actionable comments posted: 2
🤖 Fix all issues with AI agents
In
`@en/includes/tutorials/integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md`:
- Line 110: Replace the grammatically incorrect phrase "the both proxies" in the
sentence that reads "Make sure you configure Backend Settings and Deploy the
both proxies to development and Production Environments." with "both proxies"
(e.g., change to "Make sure you configure Backend Settings and deploy both
proxies to Development and Production environments.") and normalize
capitalization of "deploy" and "environments" to match surrounding style.
- Line 166: The link to WSO2 Bijira guardrails in the sentence containing the
URL "https://wso2.com/bijira/docs/create-api-proxy/third-party-apis/guardrails/"
is returning HTTP 403; either replace it with a correct public documentation
URL, add a note that the page requires special access/credentials, or remove the
link and provide an alternative public reference or an inline summary of the
guardrails; update the sentence in the markdown file to use the corrected URL or
the access note so users are not led to a forbidden page.
...torials/integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md
Outdated
Show resolved
Hide resolved
...torials/integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md
Outdated
Show resolved
Hide resolved
…y-for-agent-identity-aware-access-control.md Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
...rdeo-with-kong-ai-gateway-for-agent-identity-aware-access-control/Create_a_Dummy_Service.png
Show resolved
Hide resolved
...torials/integrating-asgardeo-with-kong-ai-gateway-for-agent-identity-aware-access-control.md
Outdated
Show resolved
Hide resolved
...torials/integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md
Outdated
Show resolved
Hide resolved
...torials/integrating-asgardeo-with-kong-ai-gateway-for-agent-identity-aware-access-control.md
Outdated
Show resolved
Hide resolved
...torials/integrating-asgardeo-with-kong-ai-gateway-for-agent-identity-aware-access-control.md
Outdated
Show resolved
Hide resolved
Co-authored-by: Pavindu Lakshan <pavindulakshan@gmail.com>
Co-authored-by: Pavindu Lakshan <pavindulakshan@gmail.com>
Updated terminology for clarity and consistency in application naming.
…ware-access-control.md
Corrected capitalization in section headings and streamlined instructions for the Request Transformer plugin.
There was a problem hiding this comment.
Actionable comments posted: 2
🤖 Fix all issues with AI agents
In
`@en/includes/tutorials/integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md`:
- Around line 104-107: Replace the incorrect model name "gpt-4o mini" with the
hyphenated Azure model ID `gpt-4o-mini` wherever it appears in the tutorial (the
line listing models alongside `gpt-5`), so API calls/configuration references
use the correct `gpt-4o-mini` identifier expected by Azure OpenAI and WSO2
Bijira's AI Gateway.
- Around line 45-47: Replace the current guidance that adds "Allowed grant
types: Password", enables the "public client", and uses the Password grant for
agent auth with instructions to use the Client Credentials (M2M) flow: register
the agent in the Asgardeo Console as an M2M application, enable the Client
Credentials grant type instead of Password, do not make it a public client,
securely persist the Agent ID and secret, and request tokens with
grant_type=client_credentials and the appropriate scopes; keep the "Access Token
type" as JWT and map required roles via "Access Token Attributes" when issuing
the token.
...torials/integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md
Show resolved
Hide resolved
...torials/integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md
Outdated
Show resolved
Hide resolved
Removed redundant line breaks and fixed minor formatting issues for clarity.
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Fix all issues with AI agents
In
`@en/includes/tutorials/integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md`:
- Around line 97-98: Replace the phrase "back-end Settings" with "backend
settings" in the list item text (the sentence starting "After creation,
configure ... and deploy it to Development and Production Environments.");
ensure the casing matches surrounding style (lowercase "backend settings") and
leave "Development" and "Production Environments" as-is unless other style
guidance requires change.
...torials/integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md
Outdated
Show resolved
Hide resolved
Removed duplicate instructions for adding an identity provider in the tutorial.
…ware-access-control.md
Purpose
This pull request adds two new end-to-end tutorials to the Asgardeo documentation, focusing on integrating Asgardeo with both WSO2 AI Gateway and Kong AI Gateway for agent identity-aware access control. These tutorials provide detailed, step-by-step guides for securely managing non-human agents in multi-agent AI systems, including configuration of identity, roles, scopes, routing, authorization, and rate limiting.
New Tutorials and Documentation Updates:
Added links to two new tutorials in the main tutorials index: "Integrating Asgardeo With WSO2 AI Gateway for Agent Identity-Aware Access Control" and "Integrating Asgardeo With Kong AI Gateway for Agent Identity-Aware Access Control".
Added new tutorial files that include the respective content for integrating Asgardeo with WSO2 AI Gateway (
integrating-asgardeo-with-wso2-ai-gateway-for-agent-identity-aware-access-control.md) and Kong AI Gateway (integrating-asgardeo-with-kong-ai-gateway-for-agent-identity-aware-access-control.md). [1] [2]Tutorial Content Additions:
Summary by CodeRabbit