3,400+ servers built on vurb.ts
Vinkius

AI Agents Enterprise.
Teams, roles, SSO, and audit built in.

Enterprise controls for MCP infrastructure. Governed by the platform, not by tickets.

OWNERADMINMEMBERVIEWCUSTOMVIEWper-project
Pillar 01

Roles & Access

Four system roles, custom roles, and project-scoped bindings. An admin in Project A can be a viewer in Project B. Zero ambiguity.

SAMLOIDCstrict mode
Pillar 02

Single Sign-On

SAML 2.0 and OpenID Connect. Okta, Azure AD, Google Workspace, or any compliant IdP. One toggle disables all local passwords.

09:41:02deployadmin@corp09:41:05accesssvc-agent09:41:08configops@team09:41:12tool_callclaudeSIEMimmutable
Pillar 03

Audit Trail

Every action logged with full attribution. Immutable entries, SIEM streaming to Splunk and Datadog, and infinite retention. No deletions, no exceptions.

Enterprise Controls

Four layers. Zero tickets.

Every enterprise capability — identity, access, isolation, and audit — is built into the platform. No add-ons. No upgrade gates. Production-ready from day one.

Identity

Roles & Access

System roles, custom roles, project-scoped bindings. Service accounts with API keys and OIDC federation for machine-to-machine auth.

Learn more
SSO

Single Sign-On

SAML 2.0 and OpenID Connect. Domain mapping, strict enforcement, and encrypted credential storage. Bring your own IdP.

Learn more
Isolation

Project Scoping

Namespace isolation per team. Servers, secrets, and access bindings scoped to the project. Three visibility levels.

Learn more
Compliance

Audit Trail

Immutable logs for every action. SIEM streaming to Splunk, Datadog, or custom webhooks. Cryptographically signed events.

Learn more
Roles & Access

Explicit permissions. Zero ambiguity.

Four system roles cover 90% of organizations. When they don't fit, clone and customize down to individual permissions. Scoped per project — an admin in Project A can be a viewer in Project B.

Built-In

System Roles

Owner, Admin, Member, Viewer — four roles that cover 90% of organizations. Each with a predefined permission set tuned to real-world access patterns.

Custom

Custom Roles

Clone any system role and modify individual permissions. Need a "Deployer" who can push servers but not manage billing? Create it in two clicks.

Scoped

Project-Scoped Binding

Roles are bound per-project. An admin in Project A can be a viewer in Project B. No global escalation. Permissions follow the namespace.

Single Sign-On

Your IdP. Your rules.

Okta, Azure AD, Google Workspace, Auth0, Keycloak — connect whatever your organization already uses. One toggle disables all local passwords. No fallback. No bypass.

SAML 2.0

SAML Single Sign-On

Enterprise-grade SAML 2.0 integration. Connect Okta, Azure AD, OneLogin, or any SAML-compliant identity provider. Assertion validation, attribute mapping, and relay state.

OpenID Connect

OIDC Authorization

Standards-based OpenID Connect flow. Google Workspace, Auth0, Keycloak, or any OIDC provider. Token validation, claims mapping, and automatic refresh.

Enforcement

Strict Mode

One toggle disables all local passwords for your organization. Members must authenticate through SSO. No fallback, no bypass, no exceptions.

Project Isolation

Every team operates independently.

Group MCP servers by team, product, or domain. Servers, secrets, and access bindings are scoped per project. No cross-boundary leaks. No shared namespaces.

Namespace

Server Scoping

Every MCP server belongs to exactly one project. Servers in Project A are invisible to Project B. No accidental cross-team access.

Environments

Staging & Production

Each project supports separate environments. Deploy to staging for testing, promote to production when ready. Environment-scoped secrets.

Secrets

Isolated Vault

Secrets encrypted per-project with AES-256. A secret in Project A cannot be referenced by servers in Project B. Zero cross-boundary leaks.

Audit & Compliance

Every action logged. Every actor identified.

Immutable audit trail for every deployment, configuration change, access event, and tool execution. Full attribution with timestamp, actor, and action. Stream to Splunk, Datadog, or any SIEM.

100%Coverage

Every API call, every deployment, every configuration change — logged with full attribution.

0Deletable

Audit entries are immutable. No user — including admins — can modify or delete the audit trail.

3SIEM Targets

Splunk HEC, Datadog Logs, and custom webhooks. HMAC-SHA256 signed with automatic retry.

Retention

Audit history is retained for the lifetime of the organization. No 90-day limits. No data purges.

AI agents never stop.
MCP Servers need Vinkius.

AI agents run around the clock. Every action is isolated, tracked, and controlled automatically. Usage limits, access rules, and data protection come built in. Nothing runs without permission. Nothing escapes without a record.

Try for Free·No credit card