Architecture
This section presents the architecture diagrams of STOA Platform, illustrating the different components, data flows and security decisions.
Interactive Diagramsβ
Architecture Globale
Vue d'ensemble des composants et flux de donnΓ©es
Control Plane
MCP Gateway
Internal Only
Authentication
Overviewβ
STOA Platform follows a cloud-native architecture deployed on Kubernetes with the following principles:
Security Zonesβ
| Zone | Trust Level | Components |
|---|---|---|
| External | Untrusted | API Clients, Claude.ai, Web Console |
| DMZ | Semi-trusted | Nginx Ingress, API Gateway, MCP Gateway |
| Internal | Trusted | Control Plane, Keycloak, Data Layer |
Main Componentsβ
- STOA Control Plane β FastAPI, UAC contract management, multi-protocol APIs
- MCP Gateway β Claude.ai integration, tool discovery, JWT context injection
- webMethods Gateway β API proxy, policy enforcement
- Keycloak β OAuth2/OIDC, multi-tenant RBAC
Data Layerβ
- PostgreSQL β Contracts, tenants, subscriptions
- OpenSearch β API logs, analytics
- Redis β Cache, sessions, rate limiting
- Kafka/Redpanda β Events, audit (π Internal Only)
- Vault β Secrets, certificates
Architecture Decision Records (ADRs)β
Important architectural decisions are documented via ADRs:
- ADR-019: Business Model & Moat Strategy β Trademark, Velocity, Ecosystem
- ADR-018: Security Hardening P0 β Team Coca Pentest Fixes
- ADR-017: Kafka Internal-Only β Zero External Exposure
- ADR-016: Multi-tenant RBAC β Isolation via JWT Context
- ADR-015: GitOps with Argo CD β Continuous Deployment
CI/CD Pipelineβ
The pipeline follows a GitOps approach with:
- Code β GitLab with Helm Charts
- Build & Test β Lint, Tests, Security Scan, Build Image
- Package β Container Registry (signed), Helm Repository
- Deploy β Argo CD with continuous sync
Supply Chain Securityβ
- SBOM β Software Bill of Materials generated automatically
- Cosign β Container image signing
- SLSA β Provenance attestations
MCP Gatewayβ
The MCP (Model Context Protocol) Gateway enables integration with Claude.ai:
Execution Flowβ
- Claude.ai sends a
tools/callwith JWT - MCP Gateway decodes the JWT and extracts the tenant
- Keycloak validates the token and verifies RBAC permissions
- Control Plane executes business logic and validates UAC contract
- Backend API processes the request
- Response returned with Trace ID
Multi-Tenant Isolationβ
Each tenant only sees their own tools:
- Parzival (IOI) β
stoa_*,ioi:billing:*,ioi:inventory:* - Sorrento (Gregarious) β
stoa_*,greg:oasis:*,greg:sixers:* - Halliday (Admin) β Full cross-tenant visibility