Skip to content

MIG provides a stable contract between model clients and providers with explicit reliability semantics, transport bindings, and conformance profiles.

Security

Security controls at the interface contract boundary.

MIG is designed for production systems that need explicit controls around invocation identity, policy enforcement, and auditability. Security posture differs by deployment mode but contract semantics remain consistent.

Control domains

Isolation

Runtime, tenant, and environment boundaries are explicit and policy-addressable.

Authentication and authorization

Identity context is propagated in contract metadata with policy checks at gateway ingress and execution boundaries.

Audit

Structured event streams support traceability for invocation intent, policy decisions, and result delivery class.

Data handling

Data flow policies can constrain payload routing, retention, and adapter egress behavior by profile.