AnDocumentation Index
Fetch the complete documentation index at: https://agent-vault-roles-unified-instance-tier.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Agent is any AI-powered process that connects to Agent Vault to proxy requests and raise proposals. Agents are instance-level entities (like users). Each holds a single instance role — owner, admin, or agent — and is granted scope on the vaults it can touch. Effective power inside each vault comes from the agent’s instance role, not a per-vault role. See Permissions for the full model.
There are two ways to connect an agent: wrapping a local process or inviting any agent via a prompt.
Wrapping with vault run
The simplest approach for local development. Wraps a local agent process with the environment variables it needs — no invite, no token management. vault run also pre-configures HTTPS_PROXY/HTTP_PROXY and the CA trust chain on the child, so the agent calls upstream URLs directly (over https:// or http://) and Agent Vault transparently injects credentials at the proxy boundary.
vault run is a convenience wrapper, not a sandbox. A child process can unset HTTPS_PROXY/HTTP_PROXY or bypass the injected CA and reach the network directly — local credentials and network access are still fully available to the agent. Stronger isolation for local development is on the roadmap.Inviting an agent
For agents you can’t wrap (cloud-hosted agents, existing sessions, CI pipelines), create an invite. The agent redeems the invite via HTTP and receives an agent token.Instance role
By default, invited agents are created with theagent instance role (proxy-only on scoped vaults). Use --role to pick a different role; only owners can mint owner-tier invites, and admins cannot grant a role higher than their own.
Vault pre-assignments
Optionally attach vault scope at invite time using the--vault flag (repeatable). The agent’s instance role decides what it can do inside each vault.
Agent names must be 3-64 characters, lowercase alphanumeric and hyphens only, and globally unique across the instance.
Adding vaults after creation
You can also grant vault access after the agent has been created:Managing agents
Agents are managed at two levels: instance-level (the agent identity) and vault-level (per-vault access).Instance-level commands
Vault-level commands
Rotating an agent token
Managing invites
The X-Vault header
Instance-level agent tokens are not scoped to a single vault. Instead, agents select a vault per-request using theX-Vault header:
/discover, /v1/proposals, and /v1/credentials.
Agents created via
agent-vault vault run receive vault-scoped sessions and do not need the X-Vault header — the vault is embedded in the session.Choosing the right approach
| Scenario | Approach | Why |
|---|---|---|
| Local dev with Claude Code or Cursor | agent-vault vault run | Simplest setup, no tokens to manage |
| Cloud-hosted agent (e.g. Devin) | agent-vault agent invite | Paste a prompt, agent connects itself |
| CI/CD pipeline | agent-vault agent invite | Named identity, survives restarts |
| Always-on assistant | agent-vault agent invite | Multi-vault access, session rotation |
What happens after connecting
Regardless of how an agent connects, it follows the same protocol:- Call
/discoverto learn which services are available - Call upstream URLs directly (over
https://orhttp://) —HTTPS_PROXY/HTTP_PROXYroutes the request through Agent Vault transparently - Raise proposals when access to a new service is needed