Developer Search
Press ⌘K or Ctrl+K to jump through guides and public API docs for user-owned master key and scoped credential flows.
Support
Support and Escalation
Use this playbook for API and broker incidents. Include tenant/principal context and request-level telemetry so support can triage auth, scope, and policy failures quickly.
Escalation Matrix
| Severity | Criteria | Initial Response |
|---|---|---|
| SEV-1 | Credential leakage risk, cross-tenant access, or active auth bypass. | Page on-call immediately; target 15-minute acknowledgement. |
| SEV-2 | Widespread token issuance failures or lease redemption outages. | Escalate to platform support; target 1-hour acknowledgement. |
| SEV-3 | Documentation errors, SDK drift, or isolated customer issues. | File support intake; target next-business-day response. |
Required Incident Context
- Absolute UTC timestamp and request ID.
- Tenant ID and principal/workload identity.
- Endpoint name, scope selector, and error code.
- Observed impact and rollback/mitigation actions taken.
- Whether DPoP/mTLS proof validation was involved.
Incident Payload Template
{
"timestamp_utc": "2026-03-04T08:22:00Z",
"tenant_id": "business-default",
"principal_id": "mcp:desktop-broker:host-01",
"endpoint": "aegis.v1.BrokerService/CreateCredentialLease",
"request_id": "req_01hq...",
"error_code": "permission_denied",
"impact_summary": "deployment pipeline blocked"
}Before Escalating
- Confirm token TTL and clock drift are within policy.
- Confirm selector scope exactly matches requested credential target.
- Confirm DPoP key or mTLS fingerprint matches registered proof binding.
- Check changelog for recent contract or policy updates.