Declare your org. Bind your roles. Ship governed agents. Powerloom is the control plane IT teams use to run Claude agents at scale — with the access model and audit trail you already expect.
Every Claude agent your teams ship is another identity with tools, credentials, and access to something it shouldn't outlive. Most orgs don't track them. Most can't revoke them. None can prove what they did.
API keys pasted into config files. Tokens shared over Slack. No revocation path when someone leaves.
Agents call tools. Tools hit systems. Nothing is reproducible, attributable, or reviewable after the fact.
One person ships a pilot. Three teams ship copies. The compliance review is the week before the audit.
If you've used Active Directory, you already know the model. OUs, security groups, role bindings, deny precedence — applied to agents, their tools, and their runtime.
Nest OUs the way engineering already does — by team, environment, or tenant. Agents, MCP deployments, and human members live inside an OU and inherit its policy.
Grant AgentAuthor to eng-leads. Deny invocations outside business hours. Stacked bindings resolve with AD semantics — deny always wins, inheritance flows down.
Agents call MCP tools through the Powerloom runtime. Every request is checked against the merged policy, logged with a decision, and streamed to the session console in real time.
The patterns you already know — organizational units, role bindings, audit trails — applied to the agents your teams are shipping.
Nest agents, groups, and MCP deployments under OUs that mirror your org chart. Policy inherits down. Admin delegates cleanly. Scoping is a structural property, not a code convention.
Built-in roles (OrgAdmin, AgentAuthor, DeploymentOperator) plus custom roles scoped to an OU or the whole org. Deny wins. Merges are deterministic.
Freeze high-risk tool calls behind a human reviewer. The agent waits. The request, the reviewer, and the decision are all rows in the audit trail.
Every agent turn, tool call, policy decision, and approval lands in a hash-chained log. Replay any session. Export to Splunk, Datadog, or S3. Redact at read time.
Every agent action is authenticated, authorized, and logged. Every policy decision is reproducible. The dangerous capabilities were never built.
OUs, security groups, role bindings, deny precedence. OIDC sign-in via Google, Microsoft, or GitHub.
Append-only. Cryptographically linked. Replayable. Exportable to Splunk, Datadog, or S3.
Per-tenant KMS keys. Secrets never land in plain text. Zero-backdoor by design.
SOC 2 audit initiated. HIPAA and ISO 27001 on the roadmap. Details on the security page.
Every OU, binding, agent, and MCP deployment is a YAML manifest. Apply with the CLI, review in PR, roll back on drift.
weave apply — plan, diff, rollout$ powerloom apply -f acme/ // planning changes against ou=acme … + ou acme/engineering/platform + role-binding eng-leads → OUAdmin (scope=platform) ~ role-binding contractors ✗ AgentAuthor (effect: allow → deny) + agent pg-writer (model=claude-sonnet-4-6) + mcp-deployment pg-analytics (template=postgres v3) // 5 changes · 0 warnings. apply? [y/N] y ✓ applied in 1.4s · run apl_9f2ac4
Invite-only beta. Request access and we'll get you running.