Skip to main content

Enterprise Overview

This page organizes the evaluation material for the four audiences that typically review open-cli before a pilot decision:

Nothing here replaces the underlying reference pages. It organizes them into the areas reviewers typically examine and surfaces the proof boundaries and operational requirements you would otherwise have to infer across pages.

For the structured checklist form of this material, see Adoption Checklist.


1. Deployment

oclird supports three practical deployment topologies.

ModelDescriptionReference
EmbeddedRuntime runs in-process per invocation. No daemon.Deployment Models
Local daemonSingle oclird process shared across CLI invocations. Warmed cache.Deployment Models
Remote runtimeCentrally hosted oclird with network-controlled access.Deployment Models

Multiple isolated instances are supported (--instance-id) so different configs, caches, and audit logs remain separated.


2. Authentication

Runtime auth is opt-in. When you enable runtime.server.auth, the daemon validates bearer tokens and applies runtime scopes before it exposes catalog entries or executes tools.

CapabilityReference
Runtime bearer auth and scope filteringRuntime Overview
Client-credentials and browser-login runtime accessDeployment Models
Authentik as a broker-neutral reference proofAuthentik Reference Proof
Microsoft Entra as a documented upstream federationAuthentik Reference Proof
Per-request auth resolution and secret sourcesAuth Resolution · Secret Sources
Policy and execution approvalPolicy and Approval

The Authentik reference proof page is the primary evidence document for brokered auth. It covers oauthClient (automated) and browser-login (manual) proof, with Entra federation documented as a named upstream.


3. Reproducible proof

Enterprise reviews typically need evidence that claimed capabilities can be exercised reliably, not just narrated.

Evidence typeHow to verifyReference
CI-reproducible product pathsmake product-test-fleet — artifacts written under /tmp/ocli-fleet/Fleet Validation
Runtime auth failure pathsCovered in the remote-runtime-auth-failures fleet laneFleet Validation
Live proof (external IdP, Entra federation)Documented in live-proof-matrix.yaml; requires real infrastructureFleet Validation

The fleet page explains which lanes are CI-safe and which require live external systems. It does not overclaim the CI boundary.


4. Auditability

Every tool execution and auth event is written to an append-only JSON audit log.

CapabilityReference
Audit log format and event typesAudit Logging
Runtime instance isolationTracing and Instances
Cache refresh behaviorCache and Refresh

Current caveats on the audit log: no built-in rotation or retention policy, no server-side filtering on GET /v1/audit/events, and fsync durability is best-effort.


5. Known gaps

This section will remain honest about what the project does not yet claim as a solved, reproducible proof path.

  • Token revocation — expiry, signature validation, issuer/audience checks, and scope enforcement are covered. Revocation and introspection-backed runtime auth are tracked gaps, not solved capabilities.
  • Live identity proof — browser-login and Entra federation require real external infrastructure to prove. CI cannot cover them. The live-proof-matrix.yaml format tracks these as explicit operator-run evidence rather than hiding them.
  • OTEL exportobs.Observer is the extension point but there is no built-in OpenTelemetry exporter or on-disk trace sink today.

See Enterprise Readiness for the full narrative, including the recommended evaluation sequence.


6. External operational requirements

The following capabilities are not provided by open-cli itself. They require operator-owned infrastructure or process. This list is consolidated here so reviewers do not have to infer it across pages.

RequirementWhy it mattersWhat you provide
Token revocation / introspectionRuntime validates token at issuance time. Revoked tokens remain valid until expiry.External revocation check in your network path, or short expiry windows as mitigation.
Audit log rotation and retentionAudit file is append-only with no built-in rotation, retention, or purge policy.Log rotation tooling (logrotate, sidecar, or log forwarder) against the audit path.
Network access control to oclirdBind address controls the interface. Beyond that, oclird itself does not enforce network perimeter.Firewall rules, reverse proxy auth, SSH tunneling, or container/network isolation for remote deployments.
Live identity proofAuthentik and Entra federation require a real tenant, application registration, and test identity.Own infrastructure for browser-login and federation proof runs.
Audit sink / SIEM integrationThere is no push exporter. Audit data is available on disk or via GET /v1/audit/events (full file, no filtering).Pull-based log shipper or a sidecar reading the audit file.