Documentation Index
Fetch the complete documentation index at: https://docs.igrisecurity.com/llms.txt
Use this file to discover all available pages before exploring further.
Quickstart
This guide walks you through signing up, creating a connection, writing your first policy, and making a governed MCP tool call.1. Sign Up
Navigate to app.igris.dev/signup and create an account using email/password or OAuth (GitHub, Google). After signup you’ll be prompted to create your first organization.2. Create a Connection
Connections are encrypted credential vaults for your upstream MCP servers. Go to Governance → Connections and click New Connection. Provide:- Name — a human-readable label (e.g., “GitHub Production”)
- Slug — a URL-safe identifier (e.g.,
github-prod) - Upstream URL — where the real MCP server lives (e.g.,
https://mcp.github.com) - Credential — the upstream API key or token (encrypted at rest)
3. Install the SDK
4. Generate an MCP Config
5. Create Your First Policy
Go to Governance → Policies and click Create Policy. Example: block destructive operations for interns.* at the end allows everything not explicitly denied. Conditions on metadata.role only apply when the SDK passes that metadata.
6. Trigger a Tool Call
Use your MCP client as normal. The gateway will:- Authenticate your API key
- Inject the upstream credential (from the connection)
- Evaluate policies (including metadata conditions)
- Log everything to the audit trail
7. View the Audit Trail
Go to Monitoring → Audit Trail to see every tool call, including:- User (from
X-Igris-Userheader) - Trace ID (for correlating multi-step requests)
- Tool name + arguments
- Policy action (allowed / denied / alerted)
- Connection used
- Latency
What’s Next?
SDK Deep Dive
Learn about identity, metadata, trace IDs, and resource management.
Connections
Manage encrypted credentials, rotate tokens, and control access.
Policy Conditions
Metadata-based rules, deny-by-default, and condition operators.
Anomaly Detection
Set up rate spike and destructive pattern alerts.