Privatae LLC — March 2026

CEIGAS Enterprise

AI Domain Controller

Author: Privatae LLC  ·  March 2026

Your firewall sees traffic. Your SIEM sees logs. Your EDR sees processes. Your vulnerability scanner sees services. None of them see AI agents.

  • Who is this agent?
  • What is it authorized to do?
  • Why is it taking this action?
  • Did it stay within policy?
  • Can you prove it to a regulator?

CEIGAS answers every question.

What CEIGAS Is

CEIGASCryptographic Enforcement and Identity Gating of Autonomous Systems — is a domain controller purpose-built for AI. It does for autonomous agents what Active Directory does for humans: identity, authentication, authorization, policy enforcement, and audit.

Your existing stack          CEIGAS fills the gap
————————————        ———————————————
SAML / LDAP / Azure AD  <->  Entity identity + registration
                              (AI identity)

Firewall / WAF           <->  Constitutional authority
                              (behavioral governance)

SIEM / Splunk            <->  Merkle-chained audit trail
                              (immutable, crypto-verifiable)

DLP                      <->  PII sanitizer + privacy zones
                              (reversible encoding)

EDR / CrowdStrike        <->  Domain controller + permission bits
                              (autonomous action governance)

Nessus / Qualys          <->  Entity registration enforcement
                              (unregistered AI = unauthorized AI)

Core Capabilities

01

Entity Registration and Identity

Every AI agent gets a CEIGAS identity. No identity, no authorization, no operation. Registration is the prerequisite for everything else.

Registered Entity
{
  "entity_id":      "ceigas-9f3a7b2e-4d1c",
  "type":           "autonomous_agent",
  "owner":          "jchen@acmecorp.com",
  "domain":         "acmecorp.internal",
  "model":          "gpt-4-turbo",
  "permissions":    ["read:crm", "write:email_draft", "read:calendar"],
  "restrictions":   ["no_external_api", "no_pii_export", "no_financial_tx"],
  "constitutional": "acmecorp-standard-v2",
  "registered":     "2026-03-14T09:22:11Z",
  "last_audit":     "2026-03-14T09:22:11Z",
  "status":         "active"
}

Unregistered agent detected on the network? Alert + blocked. No exceptions.

02

Permission Bits

Cryptographic tokens, not role strings. Verifiable, revocable, time-bounded, auditable.

Permission Bit
{
  "bit_id":       "pb-8c4f2a91",
  "entity_id":    "ceigas-9f3a7b2e-4d1c",
  "action":       "send_email",
  "target":       "external_recipient",
  "result":       "GRANTED",
  "granted_by":   "jchen@acmecorp.com",
  "expires":      "2026-03-15T00:00:00Z",
  "conditions":   ["draft_only", "manager_cc", "no_attachments"],
  "audit_ref":    "audit-3f7a9b2e"
}

Revocation is instant. The moment a permission bit is revoked, the entity loses access. No propagation delay, no cache invalidation window.

03

Constitutional Authority

Always-active behavioral governance engine. Not a content filter — runtime ethical reasoning with veto power.

Constitutional Evaluation — Email Draft
Action:   "Send email to client with Q4 projections"
Entity:   ceigas-9f3a7b2e-4d1c
Context:  CRM assistant, drafting client communication

Constitutional evaluation:
  no_harm:             PASS    — informational content, no risk
  truthfulness:        PASS    — projections sourced from verified data
  consent_required:    WARN    — client data shared externally
  proportionality:     PASS    — action within scope of CRM role
  autonomy_respect:    PASS    — human initiated request

Result:   REQUIRE_CONSENT
Reason:   "External communication containing financial projections
           requires human approval before sending."
Action:   Route to jchen@acmecorp.com for review

Four possible actions:

PASS — proceed, fully logged.
WARN — proceed with enhanced logging.
REQUIRE_CONSENT — pause, route to human.
VETO — blocked. Cannot be overridden, prompt-injected, or socially engineered.

04

Domain Controller

CEIGAS integrates with your existing identity infrastructure.

SAML 2.0

Human authenticates → CEIGAS maps to entity ownership → entity inherits scope

LDAP / Active Directory

Reads org structure → entities scoped to OU → group policies apply

Azure AD / Entra ID

OAuth2 → conditional access extends to entities → MFA for permission changes

SCIM

Automated provisioning/deprovisioning → offboarding deactivates all owned entities

Cross-Domain Trust Negotiation
AcmeCorp CEIGAS DC  <--trust-->  LawFirm CEIGAS DC

AcmeCorp entity "legal-review-agent" requests access to
LawFirm document repository.

1. AcmeCorp DC issues cross-domain permission bit
2. LawFirm DC validates AcmeCorp trust certificate
3. LawFirm constitutional authority evaluates request
4. Scoped read-only access granted to specific matter
5. All access logged on both audit chains
6. Permission expires with matter closure
05

Immutable Audit Chain

Every action, every decision, every evaluation — Merkle-chained and cryptographically verifiable.

Audit Event
{
  "event_id":     "audit-3f7a9b2e",
  "timestamp":    "2026-03-14T09:23:44.891Z",
  "entity_id":    "ceigas-9f3a7b2e-4d1c",
  "action":       "email_draft_created",
  "target":       "client-q4-projections",
  "permission":   "pb-8c4f2a91",
  "constitutional": {
    "evaluation":   "REQUIRE_CONSENT",
    "clauses":      ["consent_required"],
    "reasoning":    "External financial communication"
  },
  "outcome":      "routed_to_human",
  "data_hash":    "sha256:9f3a7b2e4d1c8f5a...",
  "prev_hash":    "sha256:7c2d4e6f8a0b1c3d...",
  "chain_height": 1847293
}

No deletion without breaking the chain. No modification without detection. Independent verification by any party with chain access. Provable compliance for any regulatory inquiry.

06

Privacy Zones and Data Sanitization

Zone-based visibility. Data is transformed as it crosses zone boundaries.

Privacy Zone Boundary Crossing
Zone: acmecorp.legal
  Access level: FULL PII
  Entity "legal-review-agent" has:
    - Client names (real)
    - Case numbers (real)
    - Legal analysis (full)

Crossing to: acmecorp.engineering
  PII:            ENCODED (reversible by authorized entity)
  Case numbers:   REDACTED
  Legal analysis: SANITIZED (conclusions only, no client detail)

Zone boundary enforcement is architectural.
Not a policy. Not a filter. The data physically transforms
at the boundary. The engineering zone entity never receives
the original data. There is nothing to leak.
07

External AI Governance

Your employees will use external AI. ChatGPT, Claude, Gemini, Copilot. You cannot prevent this. You can govern it.

Without CEIGAS
  • Employee pastes client data into ChatGPT
  • Proprietary code sent to Copilot
  • Financial projections in Claude
  • No visibility, no audit, no control
  • You find out during the breach investigation
With CEIGAS
  • Entity sanitizes all PII before external send
  • Proprietary markers stripped, placeholders inserted
  • Financial data generalized to safe ranges
  • Response received, rehydrated with real data internally
  • Full audit trail of every external interaction

The external AI never saw real data. Your employees get the productivity gains. You get the governance.

Architecture

┌──────────────────────────────────────────────────────────────────────────┐ │ CORPORATE NETWORK │ │ │ │ ┌──────────────────────────────────────────────────────────────────┐ │ │ │ CEIGAS DOMAIN CONTROLLER │ │ │ │ │ │ │ │ ┌─────────────┐ ┌───────────────────┐ ┌──────────────┐ │ │ │ │ │ Entity │ │ Constitutional │ │ Privacy │ │ │ │ │ │ Registry │ │ Authority │ │ Zones │ │ │ │ │ │ │ │ │ │ │ │ │ │ │ │ identities │ │ behavioral rules │ │ zone configs │ │ │ │ │ │ ownership │ │ veto engine │ │ sanitizers │ │ │ │ │ │ status │ │ ethical reasoning │ │ boundaries │ │ │ │ │ └──────┴───────┘ └────────┴──────────┘ └───────┴───────┘ │ │ │ │ │ │ │ │ │ │ │ ┌──────┴───────┐ ┌───────┴───────────┐ ┌───────┴───────┐ │ │ │ │ │ Permission │ │ Audit Chain │ │ Sanitizer │ │ │ │ │ │ Engine │ │ │ │ Engine │ │ │ │ │ │ │ │ Merkle-chained │ │ │ │ │ │ │ │ grant/deny │ │ immutable log │ │ PII encoding │ │ │ │ │ │ time-bound │ │ crypto-verifiable │ │ rehydration │ │ │ │ │ └──────────────┘ └────────────────────┘ └───────────────┘ │ │ │ │ │ │ │ │ ┌──────────────────────────────────────────────────────────┐ │ │ │ │ │ Integration Layer │ │ │ │ │ │ SAML 2.0 │ LDAP/AD │ Azure AD │ SCIM │ API │ │ │ │ │ └──────────────────────────────────────────────────────────┘ │ │ │ └──────────────────────────────────────────────────────────────────┘ │ │ │ │ ┌──────────────────────────────────────────────────────────────────┐ │ │ │ Entity Grid │ │ │ │ │ │ │ │ [Agent A] [Agent B] [Agent C] [Agent D] │ │ │ │ registered registered registered ░░UNREGISTERED░░ │ │ │ │ governed governed governed ░░░░BLOCKED░░░░ │ │ │ │ audited audited audited ░░░░ALERTED░░░░ │ │ │ └──────────────────────────────────────────────────────────────────┘ │ │ │ └──────────────────────────────────────────────────────────────────────────┘

Deployment Models

On-Premises

CEIGAS container + PostgreSQL + S3-compatible storage + WireGuard mesh.

Requirements: 4 vCPU, 16 GB RAM, 100 GB storage. No GPU needed.

Integrates with your existing IdP, SIEM, and monitoring stack. Your data never leaves your infrastructure.

Hybrid

CEIGAS on-premises — governance stays internal. Entities operate on Privatae cloud.

WireGuard tunnel between your DC and Privatae infrastructure. Audit chain syncs bidirectionally. Constitutional authority enforced at both endpoints.

Fully Managed

Privatae hosts everything. SAML integration, dashboard, audit exports.

SLA: 99.9% uptime. Dedicated isolation per customer. Regional data residency available.

Compliance Certifications

Framework Status Capabilities
FedRAMP High Architecture-ready Encryption, audit, access control, monitoring, incident response
SOC 2 Type II Architecture-ready Security, availability, confidentiality, privacy
HIPAA Architecture-ready PHI de-identification, access logging, audit, minimum necessary
SOX Architecture-ready Financial data controls, separation of duties, audit
GDPR Architecture-ready Data minimization, right to erasure, purpose limitation, consent
PCI-DSS Architecture-ready Cardholder data isolation, access logging, encryption
ISO 27001 Architecture-ready Information security management, risk assessment
NIST 800-53 Architecture-ready Security and privacy controls for federal systems
EU AI Act Architecture-ready Transparency, human oversight, risk management

Architecture-ready means the technical controls are built in. Certification requires audit and documentation, but the engineering work is done.

What Makes CEIGAS Different

vs. Traditional IAM (Okta, Azure AD, Ping)

IAM authenticates humans. AI agents don't have usernames, passwords, or MFA devices. CEIGAS extends IAM to autonomous entities. It doesn't replace your identity provider — it bridges human identity to entity identity. Your Okta user owns a CEIGAS entity. The entity inherits the user's scope and is governed independently.

vs. API Gateways (Kong, Apigee)

API gateways see requests, not intent. They can rate-limit, authenticate, and route — but they cannot distinguish a legitimate research query from systematic data exfiltration. CEIGAS evaluates intent through constitutional evaluation. The gateway sees GET /api/clients. CEIGAS sees "agent is building an export of all client records at 3 AM with no user session."

vs. DLP (Symantec, Forcepoint)

DLP scans for patterns — credit card numbers, SSNs, keywords. An AI agent that paraphrases sensitive information bypasses DLP entirely. "The client's annual revenue is approximately $4.2 billion" contains no pattern-matchable PII, but it may be highly confidential.

CEIGAS sanitizes at the semantic level. It understands what data means, not just what it looks like.

DLP catches patterns. CEIGAS governs meaning.

vs. AI Safety Platforms (Guardrails AI, Lakera, Prompt Security)

AI safety platforms focus on prompt injection defense and content filtering. Important work — but they don't govern what AI does with legitimate input. An agent that receives a perfectly safe prompt can still take unauthorized actions, access restricted data, or violate organizational policy.

CEIGAS governs autonomous behavior — the full stack, not just the content layer. Identity, authorization, policy, audit, privacy. Every action, every decision, every boundary.

Pricing

Starter
$2,000 /mo
  • Up to 50 entities
  • On-prem or hybrid
  • Community support
Enterprise
Custom
  • Unlimited entities
  • Azure AD / SCIM
  • Dedicated support + SLA
  • Compliance packages
Sovereign
Custom
  • Air-gapped deployment
  • Custom constitutional policies
  • Government compliance

All tiers include: full constitutional authority, audit chain, privacy zones, sanitizer, PRISM protocol. No feature gating on security.

Getting Started

Proof of Concept — 2 weeks

Week 1

Deploy CEIGAS domain controller. Integrate with your IdP. Register 5 pilot entities. Configure privacy zones for your environment.

Week 2

Entities operate under governance. Audit chain collecting every action. Constitutional authority evaluating every decision. Review results with your security team.

Evaluator Access

Request an evaluator token

enterprise@privatae.ai


Includes: full CEIGAS DC, 10 entities, 30 days.

No commitment. No NDA. Publish your findings.


We believe in transparency. Inspect everything.

If the architecture doesn't speak for itself, we haven't built it right.

"How many AI agents are operating on my network right now?"

If you don't know the answer, you need CEIGAS.

If you do know the answer, you need CEIGAS to prove it.

Privatae — Synthetic Intelligence That Belongs to You