Overview: Two-Part Process
Part 1: Enable Creation
Tenants create agents and contexts using AMS SDK components
Part 2: Deploy to Users
You deploy agents to end-users via Agent Sessions API
Part 1: Enable Tenant Creation
1
Configure in AMS SDK Playground
- Access Developer Tools → AMS SDK Playground
- Preview components (Agent Manager, Context Manager)
- Customize theme, colors, fonts
- Select which configuration tabs to display
- Generate integration code
2
Embed Components in Your Platform
For complete UI with list view:
<mindset-agents-manager><mindset-contexts-manager>
<mindset-agent-configuration><mindset-context-configuration>
3
Generate Authentication Token for Tenant Admin
Before the tenant admin can use AMS SDK components:
- Generate an
authTokenfor the tenant admin user - CRITICAL: When creating the authToken, explicitly designate the user as a tenant admin by passing the
externalTenantId - Provide this authToken to the Mindset SDK that runs in the tenant admin’s page
The tenant admin must have an authToken with
externalTenantId specified to access AMS SDK components4
Tenant Creates Agent
Tenant Admin (externalTenantId: “tenant-acme-123”) → Creates Agent via Agent Manager or Agent Configuration
5
Tenant Creates Contexts & Uploads Files (Optional)
- Creates Contexts via Context Manager or Context Configuration
- Uploads Files (PDFs, docs, training materials, etc.)
This step is optional if you’re providing app-level contexts or using RAG MCP
Part 2: Deploy to End-Users
1
Your Backend Determines Permissions
Based on your platform’s permission system, determine for each end-user:
- Which agent(s) should they access?
- Which contexts/knowledge should they see?
- Which MCP tools should be available?
2
Create Agent Session via API
Required:
agentUid(tenant’s agent)externalUserId
contextUids(up to 30)- OR 1 RAG MCP
mcpserverUids(tools, up to 5 total)
tags(include externalTenantId)
3
Receive agentSessionUid
API returns unique session identifier Example:
agentSessionUid: "agent-123::session-789"4
Generate Authentication Token for End-User
Before the end-user can access the agent:
- Generate an
authTokenfor the end-user - CRITICAL: The user’s
externalUserIdin the authToken must be an exact match to theexternalUserIdused when creating the agent session for them - Provide this authToken to the Agent SDK component
5
Embed Agent Chat SDK for End-User
In the end-user’s UI, embed:✅ Deployment Complete!
Key Concepts
Authentication Requirements
Authentication Requirements
For Tenant Admins (AMS SDK):
- Generate authToken with
externalTenantIdspecified - This designates them as tenant admin with access to AMS SDK components
- Generate authToken with
externalUserId externalUserIdmust exactly match the one used in the agent session creation
Tenant Isolation
Tenant Isolation
externalTenantIdfilters what tenants see in AMS SDK components- Your backend enforces isolation in agent sessions
- The same
externalTenantIdin the AMS SDK components means users see each other’s agents/contexts in the list views - Different
externalTenantIdvalues mean complete isolation in the list views
Flexible Context Mixing
Flexible Context Mixing
- Agent sessions can combine app-level and tenant-level contexts
- You control what each user sees through the Agent Sessions API
- Up to 30 contexts can be provisioned per agent session
Per-User Permissions
Per-User Permissions
- Same agent can be deployed with different contexts and tools for different users
- Based on your platform’s permission system
- Your backend determines what each end-user can access
Agent Session Composition Rules
Rule 1: Knowledge Sources (Mutually Exclusive)
Rule 2: MCP Servers (Maximum 5 Total)
RAG-type MCP: 0 or 1Tools-type MCPs: 0 to 5
✅ Valid: 1 RAG MCP + 4 Tools MCPs = 5 total
Rule 3: Tags (Maximum 10)
Used for reporting, grouping, and filteringRecommended: Include externalTenantId