FOR PLATFORM TEAMS BUILDING PRODUCTION AGENT SYSTEMS

MongoDB Managed Agents

The platform to run, govern, and scale your agents — built natively on Atlas.

The Agent Lifecycle

Five stages. One continuous loop. Perceive. Retrieve. Reason. Act. Store — every cycle sharpens the agent, and MongoDB powers each step. Click any phase to explore.

Memory Types Involved
MCP Tool Calls
Explore memory types

Working Memory

Short-term conversation context — the agent's scratchpad.

TTL Index Change Streams
working_memory
📖

Episodic Memory

Past interactions and experiences — the agent's autobiography.

Timestamped Docs Atlas Search
episodes
🧠

Semantic Memory

Knowledge and facts — the agent's world understanding.

Vector Search Voyage AI
knowledge
⚙️

Procedural Memory

Learned skills and workflows — the agent knows how.

Document Model Aggregation
procedures
🏛

Long-term Memory

Persistent preferences and profiles that grow over time.

Flexible Schema Upserts
user_profiles
📚

Taxonomic Memory

Structured categories and domain terminology.

$graphLookup Hierarchical Docs
taxonomies
💼

Entity Memory

People, products, and organizations the agent knows.

Document Model Rich Queries
entities
🤝

Shared Memory

Cross-agent sharing — one learns, the team benefits.

RBAC Multi-tenant
shared_memory

MCP Connects It All

The Model Context Protocol gives every agent native access to MongoDB — 25+ tools for querying, writing, and managing data. No driver code required.

Learn more about Agentic Memory on MongoDB →

🤖
Your Agent
mcp:find · mcp:aggregate
mcp:insert · mcp:update
MCP
MCP Server
queries · aggregations
writes · updates
MongoDB Atlas

You Built the Agent.
Now Put It in Front of a Million Users.

Your agent runs the loop perfectly on your laptop. But production means concurrent sessions, compliance audits, isolated compute, and data that never leaves your cloud. That's a different problem.

🔒

Who gets to call what?

Which models are approved? Which tools can this agent invoke? What are the spending limits? At scale, every request needs policy enforcement before code runs.

📦

Where does it actually run?

One agent's crash can't take down another. Each execution needs its own sandbox — isolated compute, isolated filesystem, isolated network. At scale, you need a container orchestrator purpose-built for agents.

🛡

Did it do the right thing?

The agent responded. But did it stay within guardrails? Did it hallucinate a policy number? Did it access data it shouldn't have? At scale, you validate after execution, before the user sees it.

MongoDB Managed Agents

Your agent keeps its cognitive loop. The platform adds orchestration, isolated execution, and governance — so every request is routed by policy, sandboxed at runtime, and validated before it reaches the user.

YOUR AGENT'S COGNITIVE LOOP
👁Perceive
🔀Routenew
🔍Retrieve
🧠Reason
🚀Executenew
Act
🛡Governnew
💾Store

Under the Hood

Click any component to explore.

🔐 API Gateway
🧠 Orchestrator
Agent Executors
🧬 ExoMemory
🔧 Tool Executors
📦 Image Registry
⚙️ Runtime Data Store
🏦 Customer Data Store
🔑 Secrets Store
📊 Observability
Capabilities
Connected To
THE STRUCTURAL DIFFERENTIATOR

Your Data Never Leaves Your Atlas

The Customer Data Store is a dedicated cluster in your Atlas organization. Memory, checkpoints, traces, guardrails — all stored where you control encryption, access, and compliance. Not in MongoDB's cloud. Not in a shared tenant. Yours.

Customer-Owned Encryption
Your Atlas, your encryption keys. Full control over data-at-rest and in-transit encryption policies.
Same Org as Your Database
One Atlas organization for your database and managed agents. Unified billing, unified governance.
Regulated-Industry Ready
Built for finance, healthcare, telecom. Your compliance posture extends naturally to agentic workloads.
MongoDB Managed Agents
📄 Agent
Data
🔒 Your Atlas Org
VS
Hyperscaler Platforms
📄 Agent
Data
🔓 Their Cloud ⚠️

Organization → Project → Workspace

A familiar hierarchy built for agent isolation. Click to explore.

Organization — data isolation boundary
Project — deployment environment
Workspace — agent application
Shared Resources — inherited by workspaces

See Agents Run

Watch MongoDB Managed Agents orchestrate enterprise agents in real-time. Select an industry and scenario to begin.

Execution Stage
Select a scenario above to
watch Managed Agents in action.

From Local to Production in Minutes

Build, deploy, and observe agents with the Atlas Agents CLI.

atlas-agents-cli
atlas-agents-cli
trace-viewer — agent-execution #a3f8c2
📱 Client 2ms
🛡 API GW 8ms
🧠 Orchestrator 12ms
Agent Exec 890ms
🔧 lookup_policy 120ms
🔧 assess_damage 340ms
🔧 create_claim 180ms
🧬 Memory 45ms
🏦 CDS 62ms
Response 3.4s
Agent Exec ↓ LLM Call (claude-sonnet) — 890ms
OpenTelemetry Trace 3.4s total
agent-execution 3.4s
orchestrator.policy-check 8ms
model-authorization: pass
tool-authorization: pass
agent-executor.run 2.1s
llm-call.claude-sonnet 890ms — $0.002
input_tokens: 1,240
output_tokens: 380
model: claude-sonnet-4-20250514
tool-calls 1.2s
lookup_policy 120ms
policy_id: "POL-2024-8391"
result: found
assess_damage 340ms
severity: moderate
confidence: 0.94
create_claim 180ms
claim_id: "CLM-2026-44102"
status: created
memory.write 45ms
type: episode
stm: stored · ltm: indexed
checkpoint.store 62ms
checkpoint_id: "chk_a3f8c2_07"
size: 2.4KB

Any Framework. One Platform.

Start with LangGraph today. Bring CrewAI, Google ADK, or your own framework tomorrow.

🕸️
LangGraph
Available Now
🤖
CrewAI
Coming Soon
🚀
Google ADK
Coming Soon
🐍
Custom Python
Coming Soon
python — LangGraph
from mongodb_agents import tool, memory
from langgraph.graph import StateGraph

@tool(name="lookup_policy")
def lookup_policy(policy_id: str) -> dict:
    """Retrieve policy from Customer Data Store."""
    return memory.customer_ds.find_one(
        {"policyId": policy_id}
    )

@tool(name="assess_damage")
def assess_damage(description: str) -> dict:
    """Assess damage severity using ML model."""
    ...

# Define the agent graph
graph = StateGraph(ClaimsState)
graph.add_node("intake", intake_node)
graph.add_node("assess", assessment_node)
graph.add_node("decide", decision_node)
graph.add_edge("intake", "assess")
graph.add_edge("assess", "decide")

agent = graph.compile(
    checkpointer=memory.checkpointer()
)
python — CrewAI
from mongodb_agents import tool, memory
from crewai import Agent, Task, Crew

claims_agent = Agent(
    role="Claims Processor",
    goal="Process insurance claims efficiently",
    tools=[lookup_policy, assess_damage],
    memory=memory.exo(stm=True, ltm=True),
    llm="claude-sonnet"
)

assess_task = Task(
    description="Assess claim for policy {policy_id}",
    agent=claims_agent,
    expected_output="Claim assessment with recommendation"
)

crew = Crew(
    agents=[claims_agent],
    tasks=[assess_task]
)
python — Google ADK
from mongodb_agents import tool, memory
from google.adk import Agent

claims_agent = Agent(
    name="claims-processor",
    model="claude-sonnet",
    tools=[lookup_policy, assess_damage],
    instruction="Process insurance claims...",
)

claims_agent.memory = memory.exo(
    stm=True, ltm=True
)
python — Custom Agent
from mongodb_agents import ManagedAgent, tool, memory

class ClaimsAgent(ManagedAgent):
    model = "claude-sonnet"
    tools = [lookup_policy, assess_damage]

    def process(self, message: str) -> str:
        # Your custom orchestration logic
        policy = self.call_tool(
            "lookup_policy",
            policy_id=self.extract_id(message)
        )
        assessment = self.call_tool(
            "assess_damage",
            description=message
        )

        # ExoMemory auto-manages STM/LTM
        self.memory.store_episode(
            input=message,
            output=assessment
        )

        return self.generate_response(
            policy=policy,
            assessment=assessment
        )

Security That Satisfies Your CISO

Five layers of isolation. Built for regulated industries.

Network Isolation Control Plane Compute Isolation Data Isolation
🔒
🌐
Network Isolation
Private networking via AWS PrivateLink. Policies can forbid all public networking. Cross-tenant traffic denied at infrastructure layer.
PrivateLink Zero Trust Cross-tenant Deny
🛡
Control Plane Isolation
RBAC with Org Owner, Project Owner, Agent Developer, Auditor roles. Federated identity via OIDC. Service accounts for automation.
RBAC OIDC Service Accounts
📦
Compute Isolation
Per-execution sandboxed containers. No shared process space, filesystem, or memory. Container breakout mitigation beyond namespacing.
Sandboxed Per-Execution Breakout Mitigation
🏦
Data Isolation
Customer Data Store in YOUR Atlas org. Checkpoints, memory, traces scoped to owning Organization and Project. Data never crosses org boundaries.
Your Atlas Org Org-scoped No Cross-org
🔑
Secrets Isolation
Encrypted by MongoDB-managed keys. Secrets scoped to Organization/Project. Never injectable across boundaries.
Encrypted Scoped Non-injectable
🛠️
Infrastructure as Code
Terraform provider, CLI, and REST API. Define agents, projects, and policies as code.
👥
Federated Identity
OIDC, SAML, Azure Entra ID. Bring your existing identity provider.
📜
Policy Engine
Model allowlists, tool authorization, resource limits. Policies enforced at the orchestrator layer.
📋
Audit Trail
Every action logged with identity context. Full provenance for compliance and forensics.
🔏
Private Networking
AWS PrivateLink for all data paths. No traffic traverses the public internet.
👤
Agent Identity
User delegation, system roles, identity propagation. Every agent action traces back to a principal.

Where We Are Today

We believe in building in the open. Here's our honest roadmap.

June 2026
Current
Private Beta
  • AWS us-east-1 (single region)
  • LangGraph + Python SDK
  • CLI / REST API / Terraform Provider
  • OTel traces → Langfuse
  • ExoMemory (STM + LTM)
  • Multi-agent via A2A
  • Private + public networking
  • FDE-supported onboarding
Starting focused: one region, one framework, hand-guided onboarding.
September 2026
Next
Public Preview
  • Built-in Traces UI
  • Enterprise data ingestion (CDC)
  • Self-service onboarding + billing
  • Interactive tool catalog
  • Expanded framework support
  • Service accounts
  • Multi-AZ deployment
January 2027
Vision
General Availability
  • Multi-cloud: AWS + Azure + GCP
  • Multi-framework: LangGraph, CrewAI, ADK, custom
  • On-prem deployment (regulated industries)
  • Native evals platform
  • Built-in observability UI
  • Agent & Tool Marketplace
  • Environment promotion (dev → stage → prod)
  • Air-gap support
  • Dynamic agent discovery