12 Mar 2026

What is agentgateway.dev? (And why it exists)

What is agentgateway.dev? (And why it exists)

If you’re building agentic AI systems, you eventually hit the same wall:

  • Your agents need tools (MCP servers, internal APIs, SaaS)
  • They need to talk to other agents (A2A)
  • They need to call LLM providers (often multiple)

…and suddenly “just use an API gateway” stops being a satisfying answer.

That’s what agentgateway.dev is about.

agentgateway.dev is the documentation hub for the open source agentgateway project — a connectivity data plane designed specifically for agent workloads.

Docs entry point (standalone): https://agentgateway.dev/docs/standalone/latest/

Upstream repo: https://github.com/agentgateway/agentgateway


Why a new gateway for agents?

The docs put it bluntly: traditional API gateways and reverse proxies aren’t built for MCP and A2A.

Why?

Traditional gateways assume:

  • stateless request/response
  • one request → one backend
  • client-initiated traffic only

But MCP/A2A introduces:

  • stateful JSON-RPC sessions with long-lived connections
  • fan-out across multiple tool servers
  • server-initiated events (SSE) that must route back to the correct client session
  • per-session authorization (different users/agents should see different tools)

In other words: the gateway needs to be protocol-aware and session-aware — not just path-aware.


What agentgateway actually is (in one sentence)

Agentgateway is a unified LLM + MCP + A2A gateway, built for:

  • enterprise-grade security
  • observability
  • resiliency
  • multi-tenancy

And it’s implemented in Rust for performance and memory safety (important for long-lived, high-concurrency sessions).


The three big product pillars

1) LLM Gateway

Agentgateway can route traffic to major LLM providers behind a unified OpenAI-compatible API, so you can switch providers without rewriting your application.

The docs also call out “native vs translation” support per provider/API, which is a real-world detail that matters when fields/models evolve quickly.

2) MCP Gateway

Agentgateway’s MCP features (from the docs):

  • Tool federation: aggregate multiple MCP servers behind a single endpoint
  • Multiple transports: stdio, HTTP/SSE, Streamable HTTP
  • OpenAPI integration: expose existing REST APIs as MCP tools
  • AuthN/AuthZ: MCP auth spec compliance + OAuth providers (Auth0, Keycloak)

This is where agentgateway becomes the “connective tissue” between LLMs and tools.

3) A2A Gateway

Agentgateway also supports the Agent-to-Agent (A2A) protocol so agents can:

  • discover each other’s capabilities
  • negotiate modalities (text/forms/media)
  • collaborate on long-running tasks

Security & observability (the part that turns demos into systems)

From the docs:

  • Authentication: JWT, API keys, basic auth, MCP auth spec
  • Authorization: fine-grained RBAC with the Cedar policy engine
  • Traffic policies: rate limiting, CORS, TLS, external authz
  • Observability: built-in OpenTelemetry metrics/logs/tracing

If you’re building agent systems you expect to run for months, this is the difference between:

  • “we tested it once”
  • and “we can operate it safely”

Why now (the timing)

The timing is interesting because multiple milestones are converging:

  • The repo is about 1 year old (created March 2025)
  • It’s nearing ~2k GitHub stars
  • The project is crossing into the v1.0 release line (currently in alpha)

This is usually the moment when a project shifts from “early adopter playground” to “this is becoming a platform.”


Next: what I’d build first

If you want a practical entry point, pick one:

  1. LLM routing + observability (single endpoint, multiple providers)
  2. MCP tool federation (one tool endpoint, many MCP servers)
  3. Policy + RBAC (who can call which tools, under what conditions)

If you tell me which one you want to lead with, I’ll write a follow-up tutorial that’s copy/paste runnable.