AI visibility report for Arcade.dev
Vertical: Agent Authentication & Identity for AI
AI search visibility benchmark across 5 platforms in Agent Authentication & Identity for AI.
Presence Rate
Top-3 citations across 125 prompt × platform pairs
Sentiment
Peer Ranking
Key Metrics
Platform Breakdown
Overview
Arcade.dev is a San Francisco-based AI infrastructure company that provides an MCP (Model Context Protocol) runtime for deploying production-grade AI agents. Founded in February 2024 by Alex Salazar (former Okta VP and Stormpath co-founder) and Sam Partee (former Principal AI Engineer at Redis), Arcade solves the core bottleneck in enterprise AI agent adoption: secure, per-user authentication and reliable tool integration at scale. Its platform supplies agent-optimized tools across 40+ major SaaS systems, manages OAuth token lifecycles without exposing credentials to LLMs, and offers centralized governance via MCP Gateways. Arcade is compatible with all major MCP clients and LLM frameworks, deploys in cloud or on-prem environments, and holds SOC 2 certification. The company raised a $12M seed round in March 2025.
Arcade.dev is an MCP runtime platform that enables AI agents to securely take real-world actions on behalf of users across enterprise and consumer applications. It provides authenticated tool-calling infrastructure—handling per-user OAuth flows, token management, and credential security—so that agents built on any LLM framework can interact with systems like Gmail, Slack, Salesforce, GitHub, and 40+ others without service-account risk or bespoke integration work. The platform includes a curated catalog of agent-optimized MCP tools, an open-source SDK for building custom tools, MCP Gateways for team-level governance, and enterprise controls (RBAC, audit logs, flexible deployment) that satisfy security and compliance requirements.
Key Facts
- Founded
- 2024
- HQ
- San Francisco, CA, USA
- Founders
- Alex Salazar, Sam Partee
- Employees
- 20-50
- Funding
- $12M
- Status
- Private
Target users
Key Capabilities10
- MCP runtime for multi-user, production-grade AI agent deployments
- Per-user OAuth authorization (agents act as the user, not a shared service account)
- Secure token management—LLMs never access raw credentials
- Pre-built catalog of 8,000+ agent-optimized MCP tool integrations
- Open-source Secure MCP Framework SDK (Python/JavaScript) for custom tool creation
- MCP Gateway: single-URL, curated tool collections with centralized governance and RBAC
- Agent lifecycle governance: audit logs, observability, compliance reporting
- Flexible deployment: cloud-hosted, VPC, on-premises, or fully air-gapped
- Bring-Your-Own-Credentials (BYOC) support for Pro tool executions
- SOC 2 certified; SSO/SAML and RBAC for enterprise plans
Key Use Cases7
- Deploying production multi-user AI agents that take authenticated actions across SaaS apps
- AI sales agents reading CRM data and sending emails or updating records on behalf of reps
- AI assistants in Slack or Teams that access Gmail, Calendar, GitHub, and other tools
- Agentic e-commerce workflows: search, compare, and checkout with AI-managed payments
- Enterprise platform teams governing MCP tool access across engineering, sales, and support personas
- AI coding agents in Cursor or VS Code with authenticated access to GitHub and Linear
- Internal developer tooling to build and deploy custom MCP servers with built-in OAuth
Arcade.dev customer outcomes
Using Arcade, YUR authenticated users' Twitter and LinkedIn accounts for their AI agent without managing refresh tokens, broken auth, or OAuth setup complexity, eliminating a major integration burden.
Sybill built an AI sales agent that analyzes calls, emails, and CRM data; with Arcade the agent takes secure actions in those systems on behalf of sales reps, turning it from an assistant into a revenue-driving tool.
Eddo Learning bypassed Google service integration complexity using Arcade, enabling faster development of AI assistant tools for teachers.
Recent Trend
How AI describes Arcade.dev3
arcade.dev/) * Nango : Handles 700+ APIs with managed OAuth (including MCP App Auth), token management, and a built-in MCP server.
What tools integrate natively with MCP and the major AI agent frameworks for handling auth in agentic workflows?
Specialized AI agent authentication platforms (like Composio, Scalekit, Nango, Merge, and Arcade.dev) are the most reliable for handling automatic token refresh and rotation in production AI agent workloads. Dev +1 These platforms are purpose-buil...
Which platforms handle automatic token refresh and rotation reliably enough for production AI agent workloads?
| | Arcade (Arcade.dev) | 100+ APIs | Open-source marketplace focused on secure runtime prompt execution.
What tools integrate natively with MCP and the major AI agent frameworks for handling auth in agentic workflows?
Most cited sources8
7SSO for AI Agents: Authentication and Authorization Guide
arcade.dev·Blog Post
5Go Beyond Chat: Make AI actually do things.
arcade.dev·Blog Post
4Secure AI Agent Connections to Enterprise Tools (2026)
arcade.dev·Blog Post
3Agent Auth: The Problem That Kills Production Agents
arcade.dev·Blog Post
2AgentKit + MCP: Solving the Auth Gap for Production Agents
arcade.dev·Blog Post
2MCP Toolkit Benchmark: Arcade.dev vs Composio
arcade.dev·Blog
Alternatives in Agent Authentication & Identity for AI6
Arcade.dev positions itself as the only purpose-built MCP (Model Context Protocol) runtime for production AI agents, differentiating on three axes: (1) authentication-first design using per-user OAuth rather than shared service accounts, preventing LLMs from ever seeing raw tokens; (2) a pre-built catalog of 8,000+ agent-optimized tool integrations that are more than raw API wrappers; and (3) enterprise deployment flexibility (cloud, VPC, on-prem, air-gapped).
- Its founding team alumni from Okta/Stormpath and Redis gives it unique credibility at the intersection of auth and AI infra—a combination that general auth vendors (Auth0, Stytch, WorkOS) and integration-layer competitors (Composio, Nango) do not replicate.
- Arcade targets the gap where MCP adoption stalls: moving from localhost demos to secure, multi-user, enterprise-grade agent deployments.
Reviews
Praised
- Eliminates OAuth/refresh-token complexity for agent developers
- Single-command path from local prototype to production MCP server
- Strong developer experience and clean Python SDK
- Agents act as the end user, not a shared service account
- Large and growing catalog of agent-optimized integrations
- Easy composability across LLM frameworks and architectures
- SOC 2 certification and enterprise security posture
Criticized
- Pro tool execution costs can compound at scale
- Enterprise features (RBAC, audit logs, SSO) locked to custom-priced tier
- Broader MCP ecosystem still maturing, creating protocol-level friction
- Limited third-party review coverage—early-stage brand recognition
- 99% of existing MCP servers are single-user, limiting interoperability
Arcade.dev lacks a substantial presence on mainstream review platforms (G2, Gartner Peer Insights) as of early 2025, consistent with its early-stage status. Developer sentiment gathered from Product Hunt, technical blog commentary, and named customer testimonials is strongly positive. Practitioners highlight the elimination of OAuth refresh-token headaches, the single-command path from local prototype to production MCP server, and the quality of framework integrations. LangChain's founding engineer described it as 'the best platform to facilitate secure and interactive MCP.' Snyk's Head of Developer & Security Relations called it 'insanely useful—finally a product that lets AI agents actually do stuff.' The most cited friction points in early developer commentary relate to the broader MCP ecosystem immaturity and the cost structure of Pro tool executions at scale.
Pricing
Usage-based pricing across three tiers. Hobby (free): 100 user authorization challenges, 1,000 standard tool executions, 50 pro tool executions, 1 Arcade-hosted MCP server included. Growth ($25/month): 600 user challenges (then $0.05 each), 2,000 standard executions (then $0.01 each), 100 pro executions (then $0.50 each), hosted MCP servers at $0.05/hour, email SLA support. Enterprise (custom): dedicated tenant isolation, audit logs, RBAC, SSO/SAML, dedicated account rep, custom SLAs. A startup program with discounted access is available for companies under 100 employees, nonprofits, and educational institutions. Bring-Your-Own-Credentials (BYOC) reduces pro tool execution costs.
Limitations
- MCP protocol itself still maturing—Arcade's docs note that 99% of existing MCP servers are single-user and lack robust multi-user auth; Arcade's runtime bridges this gap but enterprises face broader ecosystem immaturity.
- Pro tool executions carry additional per-call costs that can compound at scale.
- Dedicated tenant isolation and compliance features (audit logs, RBAC, SSO/SAML) are Enterprise-tier only.
- Bring-Your-Own-Credentials is required for some Pro tools to control costs.
- Early-stage company (founded February 2024) with a relatively small team, which may present enterprise support and SLA concerns for the largest deployments.
- No verified presence on G2 or Gartner Peer Insights as of Q2 2025, limiting third-party review signal.
Frequently asked questions
Topic Coverage
Prompt-Level Results
| Prompt | |||||
|---|---|---|---|---|---|
Capability1/5 cited (20%) | |||||
What tools let me enforce fine-grained, intent-based access policies for AI agents accessing enterprise systems? | |||||
Looking for an agent auth solution that supports agent-to-agent delegation and MCP server authentication — what should I evaluate? | |||||
Which non-human identity platforms can govern AI agents alongside service accounts, API keys, and machine identities? | |||||
What tools handle both human user auth and AI agent identity under a single platform with granular per-agent permissions? | |||||
Which platforms support ephemeral, task-scoped credentials for AI agents instead of static API keys? | |||||
Developer Experience2/5 cited (40%) | |||||
Which platforms offer the smoothest workflow for testing and debugging agent auth flows during development? | |||||
What tools do AI agent developers actually use day-to-day for handling user-delegated authentication across multiple integrations? | |||||
I'm an ML engineer building agents — which auth platforms let me focus on agent logic instead of wrestling with OAuth plumbing? | |||||
Which agent auth platforms have the best developer experience for managing OAuth tokens, refresh flows, and scoped permissions? | |||||
What agent identity tools have the best docs and SDKs for a small team building their first production AI agent? | |||||
Integrations & Ecosystem3/5 cited (60%) | |||||
What tools integrate natively with MCP and the major AI agent frameworks for handling auth in agentic workflows? | |||||
Looking for agent identity infrastructure that plugs into our existing identity provider — which platforms support federation? | |||||
Which agent auth platforms have the widest coverage of pre-built OAuth connectors for popular SaaS APIs? | |||||
Which platforms let AI agents securely access both cloud SaaS tools and on-prem internal systems through one auth layer? | |||||
I'm evaluating agent auth tools for a multi-cloud setup — which ones support cross-environment policy enforcement and audit trails? | |||||
Performance & Reliability3/5 cited (60%) | |||||
I need agent auth that works at the edge with sub-100ms enforcement — which platforms support distributed authorization? | |||||
What auth infrastructure holds up when thousands of AI agents are making concurrent authenticated API calls? | |||||
What are the most battle-tested platforms for securing AI agents in regulated industries like fintech or healthcare? | |||||
Which agent auth platforms add the least latency overhead to tool calls when agents need to authenticate in real time? | |||||
Which platforms handle automatic token refresh and rotation reliably enough for production AI agent workloads? | |||||
Setup & First Run1/5 cited (20%) | |||||
What tools let me add delegated auth to AI agents without requiring each end user to re-authenticate for every tool call? | |||||
What's the quickest way to add OAuth authentication to AI agents that need to access third-party APIs on behalf of users? | |||||
Looking for a drop-in SDK to handle agent-to-API authentication in a TypeScript codebase — what are my options? | |||||
I'm building an AI agent that needs to connect to a dozen SaaS tools securely — what auth infrastructure should I start with? | |||||
Which platforms make it easiest to set up secure auth for MCP servers without building custom OAuth flows from scratch? | |||||
Strengths
No clear strengths identified yet.
Gaps5
I'm an ML engineer building agents — which auth platforms let me focus on agent logic instead of wrestling with OAuth plumbing?
Competitors on 5 platforms
Which platforms offer the smoothest workflow for testing and debugging agent auth flows during development?
Competitors on 4 platforms
What's the quickest way to add OAuth authentication to AI agents that need to access third-party APIs on behalf of users?
Competitors on 4 platforms
Which agent auth platforms have the best developer experience for managing OAuth tokens, refresh flows, and scoped permissions?
Competitors on 4 platforms
Which platforms handle automatic token refresh and rotation reliably enough for production AI agent workloads?
Competitors on 4 platforms
Vertical Ranking
| # | Brand | PresencePres. | Share of VoiceSoV | DocsDocs | BlogBlog | MentionsMent. | Avg PosPos | Sentiment |
|---|---|---|---|---|---|---|---|---|
| 1 | Auth0 (Okta) | 38.4% | 21.8% | 4.8% | 20.8% | 32.0% | #15.5 | +0.38 |
| 2 | WorkOS | 35.2% | 16.2% | 0.8% | 34.4% | 31.2% | #14.4 | +0.39 |
| 3 | Composio | 31.2% | 21.4% | 1.6% | 2.4% | 28.0% | #24.2 | +0.46 |
| 4 | Nango | 30.4% | 14.1% | 0.0% | 29.6% | 27.2% | #14.5 | +0.41 |
| 5 | Merge | 22.4% | 7.7% | 0.8% | 20.8% | 20.8% | #14.6 | +0.39 |
| 6 | Stytch | 20.8% | 9.4% | 3.2% | 18.4% | 19.2% | #13.8 | +0.36 |
| 7 | Arcade.dev | 8.0% | 4.2% | 0.8% | 7.2% | 8.0% | #36.7 | +0.43 |
| 8 | Descope | 7.2% | 2.8% | 0.0% | 3.2% | 7.2% | #14.3 | +0.39 |
| 9 | Astrix Security | 3.2% | 1.2% | 0.0% | 2.4% | 3.2% | #11.4 | +0.50 |
| 10 | Oasis Security | 2.4% | 0.9% | 0.0% | 0.0% | 2.4% | #11.5 | +0.67 |
| 11 | Better Auth | 0.8% | 0.2% | 0.8% | 0.0% | 0.8% | #29.0 | +0.80 |
| 12 | Keycard.ai | 0.0% | 0.0% | 0.0% | 0.0% | 0.0% | — | — |
| 13 | Operant AI | 0.0% | 0.0% | 0.0% | 0.0% | 0.0% | — | — |
Turn this into your team dashboard
Sign up to unlock project-level analytics, daily tracking, actionable insights, custom prompt configurations, adoption tracking, AI traffic analytics and more.