diff --git a/README.md b/README.md index a09576b..96d85e0 100644 --- a/README.md +++ b/README.md @@ -18,7 +18,7 @@ This is the primary marketing site for Kagenti, an open-source platform for depl Kagenti is positioned as the **infrastructure layer** beneath the agent, not a competing agent framework. The three-word positioning — *deploy, secure, govern* — anchors every section: - **Deploy:** Kubernetes-native, Ansible-automated, framework-neutral. You bring the agent; Kagenti handles workload lifecycle. -- **Secure:** Zero-trust identity via SPIFFE/SPIRE and authbridge, injected at deploy time. No agent code changes required. +- **Secure:** Zero-trust identity via SPIFFE/SPIRE and AuthBridge, injected at deploy time. No agent code changes required. - **Govern:** Unified control plane, observability, and policy enforcement across all agents and tools. The site leans hard into open-source credibility: Apache 2.0, auditable code, no feature gating, no proprietary runtime dependencies. @@ -33,7 +33,7 @@ The page tells a single story from top to bottom: 3. **Getting Started:** Reduces time-to-value friction. Shows the install is four commands. Pairs with a real UI screenshot (light/dark variants served via `` and `prefers-color-scheme`) to make the platform tangible. -4. **Demo Carousel:** Three concrete use cases (MCP Gateway, authbridge zero-trust, Lifecycle via Dashboard) showing real code. The first slide pairs with a YouTube tutorial so visitors can see the platform in motion without committing to a full demo call. +4. **Demo Carousel:** Three concrete use cases (MCP Gateway, AuthBridge zero-trust, Lifecycle via Dashboard) showing real code. The first slide pairs with a YouTube tutorial so visitors can see the platform in motion without committing to a full demo call. 5. **Community & Roadmap:** Social proof through contributor avatars and GitHub project board. Includes a "What's next" column covering the roadmap toward persistent, long-running agents — with memory, sandboxing, an Agent Development Kit, and improved developer experience as the core building blocks. diff --git a/index.html b/index.html index 714adfe..ed328eb 100644 --- a/index.html +++ b/index.html @@ -122,9 +122,9 @@

-
authbridge · SPIRE · Keycloak · Envoy
+
AuthBridge · SPIRE · Keycloak · Envoy

Security

-

authbridge injects zero-trust workload identity and JWT enforcement at deploy time. SPIRE issues cryptographic workload identities; Keycloak manages OAuth2 token scoping and validation.

+

AuthBridge injects zero-trust workload identity and JWT enforcement at deploy time. SPIRE issues cryptographic workload identities; Keycloak manages OAuth2 token scoping and validation.

@@ -299,12 +299,12 @@

Connect any tool with a secure MCP gateway.

-

Enforce zero-trust identity with authbridge.

-

authbridge injects zero-trust identity and auth enforcement into any agent at deploy time. The Weather Service Agent gets a Keycloak identity, JWT validation, and proxy enforcement — without writing a line of auth code.

+

Enforce zero-trust identity with AuthBridge.

+

AuthBridge injects zero-trust identity and auth enforcement into any agent at deploy time. The Weather Service Agent gets a Keycloak identity, JWT validation, and proxy enforcement — without writing a line of auth code.

  • SPIFFE identity and Keycloak registration provisioned at deploy
  • Inbound requests validated at the Envoy proxy — invalid tokens never reach agent code
  • -
  • authbridge adds 3 sidecars; the agent container is unmodified
  • +
  • AuthBridge adds 3 sidecars; the agent container is unmodified
View demo on GitHub →
@@ -319,7 +319,7 @@

Enforce zero-trust identity with authbridge.

--namespace team1 \ --service-account weather-service -# 3 authbridge sidecars + agent = 4/4 containers +# 3 AuthBridge sidecars + agent = 4/4 containers kubectl get pods -n team1 # weather-service-xxx 4/4 Running # weather-tool-xxx 1/1 Running