AI agents · OpenClaw · self-hosting · automation

Quick Answer

Agent Registry vs Gateway vs Identity vs Sandbox (May 2026)

Published:

Agent Registry vs Gateway vs Identity vs Sandbox (May 2026)

Google’s Gemini Enterprise Agent Platform (GA April 22, 2026) ships four governance components — Agent Registry, Agent Gateway, Agent Identity, and Agent Sandbox. They sound similar. They do very different things. This is how they actually work together.

Last verified: May 12, 2026

TL;DR

ComponentOne-line job
Agent RegistryThe catalog of what’s approved to exist and be callable
Agent GatewayThe runtime checkpoint every tool call must pass through
Agent IdentityThe per-agent cryptographic ID that makes actions attributable
Agent SandboxThe hardened isolated environment where model-generated code runs

Together they implement defense in depth: Registry decides what’s allowed to exist, Identity says who is acting, Gateway enforces what they can do, Sandbox contains the blast radius if something goes wrong.

Agent Registry — the catalog

What it is: A central, governed list of approved agents, tools, and skills inside an organization. Only items in the Registry can be discovered or invoked.

Why it exists: “Agent sprawl” is the new shadow IT. Without a catalog, every team builds its own agents, every agent calls every tool, and security has no map. Registry imposes a single source of truth.

What’s inside a Registry entry:

  • Agent or tool name, version, owner, description.
  • Allowed model(s) it can use.
  • Required permissions / scopes.
  • Approval state (pending, approved, deprecated).
  • Audit history.

Approval flow: A developer submits an agent or tool to the Registry. Security/platform review flags scope creep, sensitive data access, or risky tool combinations. Approved entries become callable. Rejected entries are not.

Without Registry: Anyone can ship anything; you cannot prove a tool is governed.

Agent Gateway — the air traffic control

What it is: The runtime policy enforcement layer. Every tool call from any agent passes through Gateway.

What it enforces:

  • Authentication — is this agent who it claims to be (via Agent Identity)?
  • Authorization — is this agent approved to call this tool (via Registry)?
  • Quota and rate limits — is this within usage caps?
  • Cost guardrails — is the projected spend within budget?
  • Model Armor — prompt-injection detection, sensitive-data leakage prevention.
  • Audit logging — every call is recorded.

Why it exists separately from Registry: Registry is policy-as-data; Gateway is policy-as-runtime. You need both: a policy that isn’t enforced is decoration, and an enforcement layer without a policy source has nothing to enforce.

Without Gateway: Registry approvals exist on paper, but agents can route around them. There’s no choke point for prompt injection defense.

Agent Identity — the crypto IDs

What it is: Each agent in the platform gets a unique cryptographic identity. Tool calls, audit logs, and inter-agent messages are signed and attributable.

What it provides:

  • Forensic attribution. An incident tracks back to a specific agent, not to a shared service account used by 47 agents.
  • Fine-grained access control. Tools can grant access to agent X without granting it to agent Y, even if both are in the same workspace.
  • Inter-agent trust. Agent A can verify that the message claiming to come from Agent B actually does — important for the Agent2Agent (A2A) protocol.
  • Third-party agent action. When a partner organization’s agent acts on your data, you can prove which agent did what.

Why it exists separately from Gateway: Gateway needs an identity assertion to authenticate. Identity is the issuance and verification layer. Splitting them keeps the PKI clean and lets Gateway scale horizontally without rolling its own crypto.

Without Identity: Audit logs say “an agent did this.” Useless for forensics.

Agent Sandbox — the blast-radius container

What it is: A hardened, isolated execution environment for running model-generated code and computer-use tasks. Browser automation, code execution, and arbitrary shell invocations run inside the sandbox, not on host systems.

What it contains:

  • Per-task ephemeral compute (containerized).
  • Isolated network egress with policy-controlled allow-lists.
  • Filesystem isolation; the sandbox cannot read host secrets.
  • Time-bounded execution; runaway processes are killed.
  • Output scrubbing before results are returned to the agent.

Why it exists: The Trustfall attack class disclosed in late April 2026 made this urgent. When agent-generated code or tool output is treated as trusted by the next step, an attacker who controls one input can compromise the whole chain. Sandboxing contains the blast radius.

Why it exists separately from Identity: Identity is “who is acting”; Sandbox is “where the action happens.” Even fully authenticated, fully approved agents can generate dangerous code. Sandbox assumes that and contains it.

Without Sandbox: A compromised tool output or a prompt-injection payload that reaches code execution owns the underlying host.

How they compose — a worked example

A finance ops agent runs the workflow “summarize Q1 vendor spend and email the CFO.”

  1. Registry check (build time). The agent was registered by the finance platform team. Its approved tools are bigquery.read, gmail.send, and a custom spend-analyzer skill. All three are in the Registry. The agent’s allowed model is Gemini 3.1 Pro.
  2. Identity issuance (deployment time). The agent gets cryptographic ID agent-fin-spend-q1-v3. All its actions will be signed with this ID.
  3. Runtime tool call: bigquery.read. The agent issues the call. Gateway intercepts. Gateway checks: is agent-fin-spend-q1-v3 registered (yes), is bigquery.read an approved tool for this agent (yes), is the query within quota (yes), does the query trip any Model Armor data-leakage rules (no). Call is allowed. Audit log entry created.
  4. Code execution: spend-analyzer generates a Python aggregation script. Code is shipped to Sandbox. Sandbox executes in isolation. The script attempts to read /etc/secrets (poisoned via prompt injection in vendor names). Sandbox blocks — that path isn’t in the egress allow-list. Result returned to the agent: error, no data exfiltrated.
  5. Runtime tool call: gmail.send. Gateway checks scope: this is to the CFO; agent identity has approval for this recipient. Call is allowed. Audit log entry created.
  6. Audit pull (post-hoc). Security team queries the Gateway audit log by agent ID. Sees every tool call. Sees the blocked sandbox attempt. Pulls the offending vendor name. Updates Model Armor rules.

Each layer caught something the others wouldn’t have. That’s defense in depth working.

How it compares to other platforms

CapabilityGemini Enterprise Agent PlatformMicrosoft Agent 365OpenAI Workspace Agents
Catalog of approved agents✅ Agent Registry✅ Approval flowPermission controls
Runtime tool-call enforcement✅ Agent GatewayEntra policiesPer-action approvals
Per-agent crypto identity✅ Agent IdentityEntra-backed identitiesWorkspace-scoped
Hardened code execution sandbox✅ Agent SandboxVia Foundry / Copilot StudioCodex sandbox
Endpoint Shadow AI detection✅ via Defender + Intune
Prompt-injection defenseModel Armor (Gateway)Across the stackCodex-level

Gemini’s stack is the most explicitly architected. Microsoft’s is the strongest at endpoint reach. OpenAI’s is the lightest-weight at this stage.

What it doesn’t do

  • Not a policy engine standard. The implementations are GCP-managed; there’s no open spec for “Agent Registry.”
  • Not free. Each component is part of the Gemini Enterprise Agent Platform Vertex AI billing surface.
  • Not portable. You can’t run Agent Gateway in front of agents on another cloud (as of May 2026).
  • Not magic. A bad Registry policy is still a bad policy. Sandbox can be misconfigured. Identity can be issued too generously. These tools are levers, not guarantees.

What to watch next

  • Whether Agent Gateway gains support for agents running outside GCP via A2A.
  • Pricing visibility for long-running agents that hit Gateway thousands of times per run.
  • Whether Microsoft Agent 365 and AWS Bedrock Agents ship analogous four-component breakdowns.
  • Whether AgentSandbox features close the gap with Anthropic’s sandbox after Trustfall.
  • Open-source equivalents for self-hosted agents (some early projects exist).

Sources

  • Google Cloud Blog, “Introducing Gemini Enterprise Agent Platform”
  • blog.google, “Gemini Enterprise Agent Platform” announcement
  • Virtualization Review, “Google Cloud Next ‘26: Gemini Enterprise Agent Platform leads AI-centric news”
  • MindStudio, “Gemini Enterprise Agent Platform business automation”
  • Google Cloud, “Gemini Enterprise / Agents” product page

Last verified: May 12, 2026.