CourtEdge ProGear
Architecture & Security Overview
The user authenticated to the Main Auth Server and got an ID Token.
But each MCP has its own Authorization Server with its own access policies.
The MCP Auth Server did not issue that ID Token. It cannot just trust it directly.
The ID-JAG (Identity Assertion JWT Authorization Grant) is a cryptographically signed "letter of introduction" from the Main Auth Server to the MCP Auth Server:
"I authenticated this user. I verified this agent. Here is a signed token binding them together, addressed specifically to you. Now YOU apply YOUR policies."
Key insight: The same AI Agent (wlp...) receives different scopes based on which user is logged in. Okta policies evaluate the user's group membership to determine what the agent can do on their behalf.
actor.sub is identical in both tokens — it's the same AI agent. But the granted scopes differ based on the user's group membership. This is Okta's governance in action.