Runtime Identity for Agent and Tool Traffic: Ping Identity Integrates with Google Cloud Agent Gateway

Apr 22, 2026
-minute read
Director, Software Engineering

Key Takeaways

 

  • Google Cloud Agent Gateway gives organizations a managed control point to secure and govern agent and tool traffic on every network path.

  • Ping Identity adds Runtime Identity and fine-grained authorization via PingOne Authorize so every agent and tool call is continuously checked and approved.
  • Together, they deliver centralized, consistent control over agent and tool traffic without changing application code.

Enterprises want agents that do real work: complete transactions, call tools and APIs, work with other agents, and move tasks across systems without constant user clicks. 

 

That means every request becomes an identity and authorization event: who is behind this action, which agent is acting, what system is being called, and should this happen for this user, in this context, right now?

 

Ping Identity’s integration with Google Cloud Agent Gateway brings Runtime Identity into that managed path. These questions are now answered at runtime, not just when things are first set up.

Ping Identity is integrating our Runtime Identity solutions with Google's Agent Gateway, delivering continuous authentication and authorization decisions on every agent and tool invocation. This gives customers a centralized way to enforce fine-grained policies—scoped MCP tools, context-based authorization, and runtime protections. Our interoperability with the Google Agent Gateway is critical to Ping’s Identity for AI strategy, combining Google's managed infrastructure with Ping's enterprise-grade identity capabilities enable agents to act with the right permissions, at the right time, in the right context, and the right scale with clear accountability to the users they represent.

Peter Barker

Chief Product Officer, Ping Identity

How it works and why it matters

Google Cloud Agent Gateway makes agent traffic simple, secure, and governed without extra appliances or code changes. It provides a single layer for:

  • Agent and tool authentication using managed and federated identities

  • Context-based authorization and MCP tool policies (such as read-only access)

  • AI protection, policy orchestration, and observability

Requests flow from a client or agent, through Agent Gateway, to an MCP server, another agent, or a downstream tool. Along the way, the gateway can combine registry metadata, authorization decisions, AI inspection, logs, and trace IDs. This matches the real need: governing a chain of actions, not just a few endpoints.

 

Connecting an agent is easy. Making sure it only does what it is allowed to do is not. Credentials alone do not stop over-privileged agents, delegated requests that exceed user permissions, or bad instructions flowing to downstream agents and tools. Runtime Identity checks identity, delegation, and policy at execution time, every time an agent acts. For non-deterministic, fast, chained AI agents, governance has to follow the request path as it happens, instead of relying on a single decision at the start.

 

Ping’s integration brings PingAuthorize directly into the Agent Gateway flow. A user signs in, a delegated agent uses that user context plus its own credentials to get an actor token, and that token enters the Google Cloud–hosted path. Before the request reaches an MCP server or another agent, an ext_proc integration calls PingAuthorize inline to evaluate it. PingAuthorize looks at the represented user, the acting agent, the downstream agent or tool, the action and resource, and the business policy in effect. If the request meets policy, it goes through; if not, it is blocked. 

 

This integration gives organizations a single place to manage authorization decisions, instead of hardcoding business rules into every MCP server, every agent implementation, and every API integration. Centralizing this logic makes policies easier to maintain, easier to audit, and easier to apply consistently as agentic architectures grow.

The Stripe demo: a simple story, familiar pattern

Stripe MCP Server demo

 

In the above diagram, a user-facing e-commerce agent talks to a Stripe MCP server. It can list products and create purchases. Stripe exposes two products: a $100 backpack and a $10,000 Team Offsite Package. Any employee can buy the backpack; only a manager can buy the Team Offsite Package. 

 

PingAuthorize, in front of the Stripe MCP server, enforces this: an employee trying to buy the offsite package is denied; a manager is allowed. The same pattern applies more broadly: the same agent may list all items but only buy some; the same backend may be reachable by many users, but specific actions depend on role, spend, or context.

Bringing Runtime Identity, authorization, and accountability to agent traffic

When agents run at machine speed, organizations also need to see and explain what happened. Google Cloud Agent Gateway’s logs and trace IDs, combined with Ping’s Runtime Identity model, make it possible to follow each request end to end and answer questions like which user was represented, which agent made the call, which agent or tool executed the action, and which policy allowed or blocked it.

 

Connectivity answers, “Can this agent reach this resource?” Enterprise-ready governance asks, “Should this agent, acting for this user, call this agent or tool for this action now?” With PingAuthorize on Agent Gateway, customers can enforce scoped MCP tool access, read-only and role-based policies, context-based rules, and runtime protections across traffic between agents and tools. 

 

This moves organizations from simply exposing services to truly governing how they are used. Ping Identity brings Runtime Identity and fine-grained authorization into that layer so every agent and tool call is checked in real time, not simply trusted because a token exists. Just as importantly, it lets teams centralize authorization logic instead of scattering business rules across every MCP server, agent, and API integration, so control stays consistent even as agent traffic scales.

Share this Article:
Related Resources

Start Today

See how Ping can help you deliver secure employee, partner, and customer experiences in a rapidly evolving digital world.