Quickstart
This guide walks you through signing up, creating an organization, registering an MCP server, writing your first policy, and viewing tool calls in the audit trail.1. Sign Up
Navigate to app.igris.dev/signup and create an account using email/password or OAuth (GitHub, Google). After signup you’ll be prompted to create your first organization.2. Create an Organization
Every resource in Igris is scoped to an organization. Enter a name (e.g., “Acme AI Team”) and you’ll be assigned the owner role. You can invite teammates later under Settings → Members with roles:- Owner — full access, billing
- Admin — manage servers, policies, compliance
- Developer — view dashboard, manage own servers
- CISO — compliance artifacts, audit trail
- Auditor — read-only access to everything
3. Register an MCP Server
Go to Governance → Servers and click Add Server. Provide:- Name — a human-readable label (e.g., “Database Production”)
- Server ID — a slug used in the proxy URL (e.g.,
db-production) - Upstream URL — where the real MCP server lives (e.g.,
http://localhost:5432/mcp)
4. Point Your MCP Client at the Proxy
Update your MCP client configuration to route through Igris. For example, in Claude Code’s.mcp.json:
5. Create Your First Policy
Go to Governance → Policies and click Create Policy. Example: block all destructive database operations.* at the end allows everything not explicitly denied.
6. Trigger a Tool Call
Use your MCP client as normal. Try calling a tool that matches your policy:7. View the Audit Trail
Go to Observe → Audit Events to see every tool call, including:- Timestamp
- Tool name
- Action taken (allowed / denied / alerted)
- Server ID
- Session ID
- Latency
What’s Next?
Policy Deep Dive
Learn about glob patterns, rate limits, and alert actions.
Ingest Logs
Connect Portkey, Helicone, or other providers to unify your audit trail.
Compliance
Generate HIPAA BAAs, SOC 2 evidence, and regulatory documents.
Anomaly Detection
Set up rate spike and destructive pattern alerts.