Alexandria EE
Alexandria EE is the Enterprise Edition of the Alexandria LLM orchestration platform. It sits in front of any OpenAI-compatible inference endpoint and enforces multi-layer access control, audit, and tenancy guarantees that commercial wrappers don't provide.
What's in EE
- OIDC / SAML federation — enterprise SSO with JIT provisioning, plugged into the existing JWT / RBAC layer
- SCIM 2.0 — automated user and group lifecycle from your identity provider
- Multi-tenancy — per-tenant isolation with tenant-scoped permission ceilings, WebAuthn, and audit chain
- Postgres storage —
pgx/v5canonical store; Rust orchestrator reads and writes over gRPC - Vault KV v2 secrets backend —
SecretsBackendtrait implementation - WebAuthn / FIDO2 — passkey authentication for admin users
- Memcached tool cache — gated on the
memcached_cacheentitlement - Changeset tracking — config-diff with rollback
- Vector index — FAISS-backed gRPC sidecar for embedding and semantic search
Deployment shapes
Alexandria EE ships in two intentionally non-equivalent product tiers.
| Shape | Target | Tier |
|---|---|---|
| Helm | Kubernetes (GKE, EKS, AKS, on-prem) | Higher — full feature set, compliance-friendly |
| Quadlet | Single Linux host (VM, bare metal) | Lower — core API on systemd; no SSO, no SCIM, no multi-tenancy |
See Deployment Shapes for the full feature matrix.
Architecture in one diagram
CLI / Web UI / SDK
│
▼
Go API (api-go/) ← chi router, JWT, RBAC, MCP bridge
│
┌────┴────┐
│ │
gRPC Postgres ← canonical store (Go-side migrations)
│
▼
Rust Orchestrator (alexandria) ← QueryPipeline, BackendClient, WorkflowExecutor
│
▼
Inference Backend (any) ← OpenAI / llama.cpp / Claude / vLLM / custom
Go owns persistence, HTTP, middleware, auth, and MCP. Rust owns orchestration, the LLM streaming pipeline, and tool dispatch. The gRPC boundary between them is stable and intentional.
Where to go next
- Operators: start with Getting Started → Helm Quickstart, then the Day-2 Runbook.
- API integrators: jump to the API Reference. The full machine-readable spec is at
openapi.yaml. - Compliance reviewers: Compliance Posture maps controls to SOC 2 / ISO 27001.