Skip to main content

Enterprise Readiness

This page is the shortest honest route through the parts of open-cli that matter during an enterprise evaluation.

Proof boundary summary

Before reading the detail sections, understand where each capability claim sits:

ClaimProof typeWhat backs it
Deployment models (embedded / local / remote)CI-reproducibleFleet matrix lanes
Runtime bearer auth, scope filtering, execution denialCI-reproducibleFleet matrix + Authentik product test
Auth failure paths (missing, expired, tampered tokens)CI-reproducibleFleet matrix remote-runtime-auth-failures lane
Authentik automated proof (oauthClient)CI-reproduciblecapability_runtime_auth_authentik_test.go
Browser-login + Entra federationLive proof onlyRequires real IdP infrastructure; tracked in live-proof-matrix.yaml
Token revocation / introspection-backed authNot implementedTracked gap; no current proof path
Audit log rotation, retention, SIEM pushNot providedOperator-owned infrastructure required
Network perimeter beyond bind addressNot providedOperator-owned firewall / proxy / isolation required

This table is the answer to "what does the repo actually prove vs. what do I still own?" If you need detail on any row, follow the references in the sections below.


What you can evaluate today

The repository already exposes concrete proof for:

  • deployment choices from embedded mode to reusable local daemon to remote runtime
  • runtime bearer auth enforced server-side through runtime.server.auth
  • scoped catalog filtering and execution denial at the runtime boundary
  • reproducible fleet validation for CI-safe lanes
  • live proof tracking for browser federation and other external-runtime scenarios
  • audit logging and runtime instance isolation

1. Deployment and trust boundary

Read:

This establishes where the runtime runs, what the default localhost safety model is, and when you should enable runtime auth.

2. Runtime auth proof

Read:

That page is the worked example for:

  • client-credentials runtime access
  • browser-login runtime access
  • a broker-neutral contract using Authentik as the reference broker
  • Microsoft Entra as the documented upstream federation example

3. Reproducible evidence

Read:

The fleet matrix shows which product paths are exercised automatically, what artifacts survive each lane, and which enterprise-only slices are tracked as live proof instead of being overclaimed in CI.

4. Operations and auditability

Read:

These pages explain what operators can inspect after execution and how separate instances keep runtime state isolated.

Questions this repo can answer

By the time you finish the pages above, you should be able to answer:

  • which deployment model fits a workstation, CI runner, or hosted runtime
  • how remote callers authenticate to oclird
  • how runtime scopes limit what a caller can see and execute
  • what proof is reproducible in CI versus what needs a live external environment
  • what logs and artifacts remain after a fleet validation run

What still remains a known gap

The project does not currently claim token revocation or introspection-backed runtime auth as a solved, reproducible proof path. Expiry, signature validation, issuer/audience checks, and scope enforcement are covered; revocation remains a tracked gap rather than a hidden assumption.

The following are also explicitly outside what the repository provides:

  • audit log rotation, retention, and purge policies (operator tooling required)
  • push-based audit export / SIEM integration (pull-based file read is the only path today)
  • network perimeter beyond bind address (firewall, proxy, or isolation are operator-owned)
  • OpenTelemetry trace export (the obs.Observer interface is the extension point; no built-in exporter exists)

See Enterprise Overview — External operational requirements for the consolidated list.