Skip to main content

User guide

What is ATLAS?

ATLAS is WWT's enterprise context engine and MCP registry. It's a single control plane that connects developers, applications, and AI assistants to approved enterprise capabilities — with governance, ownership, and audit built in from day one.

ATLAS — Plug in. Reach everything: Apps, Runbooks, MCP Servers, Security, Data, Infrastructure, Teams, and Services

Two audiences, two paths

Most people who land in ATLAS are doing one of two things. The quickest way to get value is to know which one you are.

Plug in, reach everything — how registration works

When you register a capability in ATLAS, everything happens automatically. ATLAS provisions the right gateway (Kong for APIs, agentgateway for MCP/A2A) on-demand via Admin APIs. One form, instant routing, zero manual gateway config.

1

Plug In

Fill out the registration form at /register — or paste a URL and let Point & Discover auto-detect your service type. ATLAS creates a catalog entry with governance metadata (owner, risk, classification) and saves the routing info (server URL, base URL, transport type).

2

Reach

ATLAS provisions Kong (for REST/GraphQL/gRPC) or agentgateway (for MCP/A2A) on-demand via their Admin APIs. Routes, rate limits, auth plugins — all configured automatically. Your service is live and routable immediately. ATLAS never touches the data path.

3

Discover

Your capability is instantly searchable in the catalog and discoverable through the ATLAS MCP endpoint. Any AI assistant connected to ATLAS can find and use it. Health probes run periodically to keep status current.

4

Consume

Developers connect their AI assistant via /connect and get access to every registered capability. Traffic flows direct through Kong or agentgateway to your service — ATLAS handles discovery and governance, gateways handle routing.

Register once, provision everywhere

Traditional setups require you to register in a gateway, then in a catalog, then configure discovery separately. ATLAS eliminates this — one registration provisions Kong and/or agentgateway, creates the catalog entry, and makes it discoverable via MCP. All automatically. ATLAS is the control plane, not the data path.

What ATLAS owns vs what it wraps

ATLAS doesn't reinvent agent execution or the MCP runtime. It layers a control plane on top of open-source infrastructure and fills the gap with its own catalog, governance, and UX.

FeatureImplemented byUpstream
Capability catalog · /catalog · /askATLAS
Governance overlay (owner / risk / classification / enforcement)ATLAS
Context packs and organizational memory · /contextATLAS
Intent resolution (keyword + tsvector + pgvector ANN)ATLAS
Connect AI assistant wizard · /connectATLAS
Register a capability · /register (one-stop shop)ATLAS
On-demand gateway provisioning (Kong + agentgateway)ATLAS
Health probing for registered endpointsATLAS
Audit log with trace IDs · /auditATLAS
ATLAS-as-MCP streamable endpoint · /mcpATLAS
Gateway provisioning status · /runtimeATLAS
Policy simulation UI · /governance/simulatorATLAS
Developer self-service portal · /developer-portalATLAS
Try-it-out API playground · /playgroundATLAS
Persistent webhook subscriptions (DB-backed)ATLAS
REST/GraphQL/gRPC routing + auth pluginsExternalKong Gateway
Per-call policy enforcement (Cedar)Externalagentgateway
Per-call access logsExternalagentgateway

Every record carries an enforcement_status (metadata_only · simulated · enforced · disabled) so consumers always know which features are actually wired up versus documented for future implementation.

Problems ATLAS solves

MCP server sprawl

AI tooling is spreading across the org. MCP servers multiply with no way to discover what exists, how to connect, or which one fits a task.

How ATLAS helps: ATLAS catalogs every MCP server and exposes itself as an MCP server — any AI host plugs it in and instantly gets discovery + context.

Scattered institutional context

Apps, services, teams, runbooks, and datasets live across wikis, repos, chat, and tribal knowledge.

How ATLAS helps: ATLAS provides a single searchable home with owner, links, governance posture, and audit trail per entry.

No governance for AI tools

AI assistants can call any tool they discover — no visibility into risk, data classification, or who approved access.

How ATLAS helps: Every capability in ATLAS carries risk level, data classification, enforcement status, and approval requirements. Policy simulation lets you test before enforcing.

Ownership gaps

When something breaks at 2 AM, nobody knows who owns the service, where the runbook is, or who's on call.

How ATLAS helps: ATLAS links every capability to an owner team with support contacts, escalation paths, and on-call info. The governance dashboard highlights gaps.

What you can do in ATLAS

Search the catalog

Find APIs, MCP servers, MCP tools, AI agents, applications, services, and runbooks. Filter by type, team, risk, classification, or lifecycle status. Keyword search plus semantic matching finds what you need even if you don't know the exact name.

Ask ATLAS

Type a plain-language question like 'Who owns the certificate management platform?' or 'How do I create a ServiceNow incident from my AI assistant?' ATLAS resolves your intent, identifies the right capability, and shows you the owner, risk, approval path, and setup instructions.

Connect an AI assistant

Generate a ready-to-paste MCP configuration for Cursor, Windsurf, Claude Code, or any MCP-compatible client. One connection gives your assistant access to every governed capability in the catalog.

Browse context packs

Context packs bundle related capabilities, runbooks, teams, and organizational context into curated sets. They're designed for specific audiences — an SRE pack, a security review pack, an onboarding pack — so AI assistants get the right context without seeing everything.

Review governance posture

See at a glance: how many capabilities are high-risk, AI-accessible, metadata-only, missing owners, or stale. Simulate access policies before enforcing them. Every capability shows its enforcement status honestly.

Gateway provisioning

When you register a capability, ATLAS provisions it on-demand into the right gateway: REST/GraphQL/gRPC → Kong, MCP/A2A → agentgateway. View provisioning status and sync all capabilities from the runtime page.

Explore teams

Every capability has an owner team. Browse teams to see who owns what, find support contacts, and understand the organizational structure behind the catalog.

Review audit log

Every capability view, access request, policy simulation, context pack attachment, and runtime plan render is recorded with trace IDs. Use this for compliance, debugging, and understanding usage patterns.

Register a capability

Service owners register APIs, MCP servers, tools, agents, applications, services, or runbooks. Records start as draft/metadata-only and must be reviewed before going active. The secret scanner blocks any payload that looks like a raw credential.

Manage API tokens

Create and manage API tokens for programmatic access to the ATLAS API. Tokens are scoped and audited.

How capabilities enter the system

  1. 1

    Registration

    Capabilities can enter via the web UI form, the REST API, GitOps YAML files (reconciled automatically), Backstage import, or the provisioning API.

  2. 2

    Enrichment

    The embeddings worker computes vector representations for semantic search. Relationship edges (depends-on, exposes, delegates-to) are declared or inferred.

  3. 3

    Discovery

    Users and AI assistants search by keyword + semantic similarity. Intent resolution combines both signals with governance awareness.

  4. 4

    Governance evaluation

    Access policies are evaluated at query time. Every action is audit-logged. Enforcement status is always shown honestly.

  5. 5

    Gateway provisioning

    ATLAS provisions the capability on-demand into Kong (REST/GraphQL/gRPC) or agentgateway (MCP/A2A) via their respective Admin APIs.

Enforcement honesty

ATLAS never pretends to enforce something it doesn't. Every capability carries one of four enforcement statuses:

metadata_only

The catalog records governance intent, but no runtime enforcement exists yet. This is the default for new registrations.

simulated

Policy decisions are evaluated and logged, but not enforced. Use this to test policies before flipping to enforced.

enforced

Access policies are actively evaluated and enforced at runtime. Unauthorized requests are blocked.

disabled

Enforcement is explicitly turned off. The capability is visible but unprotected.

ATLAS as an MCP server

ATLAS is both an MCP registry and an MCP server. When you connect your AI assistant to ATLAS, it gets these tools:

ToolWhat it does
resolve_intentResolve a plain-language intent into a recommended capability + governance posture.
search_contextHybrid search across the ATLAS catalog (capabilities + extensions).
get_entryFetch a single capability by slug.
find_mcpLocate MCP servers and tools by capability/name/tag.
get_context_packFetch a context pack with included capabilities/runbooks/teams.
list_context_packsList context packs filtered by team/purpose/assistant type.
list_runbooksList runbooks, optionally for a specific capability.
list_capability_dependenciesReturn inbound + outbound relationship edges for a capability.
explain_capabilityPlain-language explanation including governance posture and warnings.
whoamiReturn the principal ATLAS sees for this session.

Quick start

1

Run docker compose up to start the full stack (API, Web, MCP, Postgres, Redis, 5 mock services).

2

Seed the database: docker compose --profile seed up

3

Open http://localhost:3000 to see the catalog, governance dashboard, and all pages.

4

Connect your AI assistant: go to Assistant Setup and copy the MCP config.

5

Try Ask ATLAS — type "Who owns the certificate management platform?" and see intent resolution in action.

ATLAS is part of WWT's Citizen Development platform. See the docs/ directory for architecture, security model, policy simulation, and runtime adapter documentation.