Workspace
Server Runtime Auth and Artifact Sync
How hosted agents authenticate and consume local sister artifacts safely.
How hosted agents authenticate and consume local sister artifacts safely.
Cloud Boundary
Hosted runtimes cannot directly read files from your laptop.
Sync artifacts to server-accessible storage, then authenticate server MCP calls.
1) Enable Server Mode
Required environment:
export AGENTRA_RUNTIME_MODE=server
export AGENTIC_TOKEN="$(openssl rand -hex 32)"
export AGENTRA_ARTIFACT_DIRS="/srv/agentra:/data/brains"
# optional file-based token:
# export AGENTIC_TOKEN_FILE="/etc/agentra/token"Run strict preflight:
agentra server preflight --strict2) Sync Local Artifacts to Server
Push runtime artifacts before expecting server takeover:
./sync_artifacts.sh --target=<server-path-or-rsync-target>Sync includes:
.amem.avis.acb- optional
~/.brain.amem
3) Start MCP Runtimes on Server Host
agentic-memory-mcp serve
agentic-vision-mcp serve
acb-mcp serveExpected install + restart signal:
[####################################] 100% Install complete
Install complete: <runtime>
[next] Restart MCP host/client
[tip] Optional feedback: https://agentralabs.tech/docs/feedback4) Validate from Any MCP Client
Client-side checklist:
which agentic-memory-mcp
which agentic-vision-mcp
which acb-mcp
# then trigger first MCP tool call from your clientProtocol Parity
Desktop and server follow the same MCP contract.
Server mode only adds explicit authentication and artifact-sync requirements.
Operational Notes
- Keep
AGENTIC_TOKENsecret; preferAGENTIC_TOKEN_FILEin production. - Treat synced artifact directories as sensitive data stores.
- Re-run
agentra server preflight --strictafter deploys, token rotation, or path changes.