Skip to main content
Not every use case needs cross-application tool orchestration. Not every organization is ready to integrate identity providers. Char offers three deployment tiers because different situations call for different tradeoffs between capability and complexity.

The Tradeoff Spectrum

At one extreme, you could embed a fully-featured AI agent that requires no setup—just add a script tag with your API key and it works. The limitation: localhost only, no cross-app tools, no organizational features. This is maximum simplicity at the cost of production readiness. At the other extreme, you could require full enterprise integration before the agent does anything—identity provider, policy configuration, approval workflows. The limitation: months of setup before you see value. This is maximum power at the cost of accessibility. Char’s tiers represent different points on this spectrum, letting you start simple and add capabilities incrementally.

Tier 0: Anonymous Mode (Development)

What it is: The agent runs with your own API key from localhost, using Durable Objects for persistence without requiring IDP setup. Why it exists: Sometimes you want to validate the embedded agent experience without committing to identity infrastructure. You’re not sure if AI will add value to your application. You want to experiment locally. Tier 0 lets you add Char to a page with minimal friction:
<script src="https://unpkg.com/@mcp-b/char/dist/web-component-standalone.iife.js" defer></script>
<char-agent dev-mode='{"anthropicApiKey":"sk-ant-..."}'></char-agent>
That’s it. The agent appears, users can chat with it, and WebMCP tools on the page work. No IDP configured, no dashboard setup required. What you get:
  • Full persistence. Conversations persist across page refreshes, tied to a localStorage session ID.
  • Same streaming and tool calling. All core agent features work identically to production.
  • Local WebMCP tools. Tools registered on the current page are available.
The tradeoffs:
  • Localhost only. Anonymous mode is restricted to localhost origins for security. It won’t work from production domains.
  • No cross-app tools. The agent sees only tools registered on the current page. It can’t invoke tools from other applications.
  • No organizational features. No user tracking, no audit logs, no governance controls.
  • No external client access. Claude Desktop can’t connect because there’s no Tool Hub.
  • User provides API key. You use your own Anthropic API key rather than organization-managed credentials.
When to choose it: Tier 0 is appropriate for local development, prototyping, and validating the embedded agent experience. It’s the fastest path to seeing Char work with your tools. The limitation is isolation and localhost restriction. For production deployment, you’ll need Tier 1.

Tier 1: Authenticated Mode (Production)

What it is: Adding authentication connects the agent to Char’s backend, creating a per-user Tool Hub that aggregates tools across applications. Why it exists: The value of embedded AI increases dramatically when the agent can work across your application portfolio. But this requires identity—the Hub needs to know who the user is to scope their tools and conversations. Tier 1 requires:
  1. Configuring an identity provider in the Char dashboard
  2. Passing the user’s ID token (plus your OIDC client ID) to the embedded agent via connect()
Once configured, each authenticated user gets their own Tool Hub. Browser-based tools from all their open applications appear in a unified registry, alongside tools from any configured remote MCP connectors. Conversations persist across sessions. External clients like Claude Desktop can connect. For SSR apps, use the ticket exchange flow and pass ticketAuth to the agent instead of exposing the ID token in the browser. The tradeoffs:
  • Requires identity infrastructure. You need an IDP that issues ID tokens. For organizations without one, this is a significant prerequisite.
  • Network dependency. The agent communicates with Char’s backend. If the backend is unreachable, cross-app features don’t work.
  • More moving parts. There’s now a WebSocket connection, a cloud service, and token validation to consider.
When to choose it: Tier 1 is the right choice when users are already authenticated to your applications and you want the agent to work across them. The key enabler is identity—once Char knows who the user is, everything else follows. Most production deployments land here. The complexity of identity configuration pays off in capability: cross-app workflows, persistent conversations, external client access.

Tier 2: Enterprise Governance (Private Beta)

What it is: Adding policy controls, approval workflows, and audit capabilities on top of the Tool Hub. Why it exists: Some organizations operate under regulatory constraints. Every tool invocation might need to be logged. Sensitive operations might require explicit approval. Administrators might need to disable capabilities instantly. Tier 2 is currently in private beta. It layers governance features on top of the Tool Hub, including:
  • Approval workflows. Require user confirmation before executing sensitive operations.
  • Audit trails. Track tool usage and outcomes for compliance review.
  • Access control and guardrails (beta). Role entitlements, origin constraints, and policy checks (feature availability varies by program).
  • Planned capabilities. Tool classification, kill switches, and remote browser execution are on the roadmap; confirm availability before planning around them.
The tradeoffs:
  • Operational overhead. Someone needs to configure policies, classify tools, and review audit logs. This isn’t set-and-forget.
  • User friction. Approval workflows add steps to agent interactions. Users might find this intrusive if not calibrated carefully.
  • Complexity. More configuration surfaces mean more ways to misconfigure.
When to choose it: Tier 2 is appropriate for regulated industries (finance, healthcare), high-risk environments (data-sensitive operations), or organizations that require audit trails for compliance. The governance features justify their complexity when external requirements demand them. If you don’t have specific compliance requirements, Tier 1 is usually sufficient. Don’t add governance complexity speculatively.

Progressive Adoption

The tiers are designed for incremental adoption. Each tier builds on the previous: Tier 0 → Tier 1: Configure an identity provider and pass tokens to the agent via connect({ idToken, clientId }). Replace your API key with the user’s ID token. Your existing tools automatically publish to the Tool Hub. No code changes to tools themselves. Tier 1 → Tier 2: Configure policies in the dashboard. Your existing cross-app workflows gain governance controls. Tools don’t need modification; policy is evaluated at the Hub. This design means you can validate the experience at Tier 0 (localhost), prove value with cross-app workflows at Tier 1, and add governance when needed—without rewriting tools or restructuring your integration.

How to Decide

QuestionIf Yes →
Do users have identity (ID tokens)?Tier 1+ is possible
Do you need cross-app workflows?Tier 1+ required
Do you need remote MCP connectors?Tier 1+ required
Do you need Claude Desktop access?Tier 1+ required
Do you have compliance requirements?Consider Tier 2
Do you need approval workflows?Tier 2 required
Are you developing locally?Start with Tier 0
Ready for production?Tier 1+ required
When in doubt, start with Tier 0 for local development and validation, then add identity when you’re ready to deploy to production. Most organizations don’t need Tier 2 unless external requirements demand it.

Architecture Note

All tiers use Cloudflare Durable Objects for persistence. The difference between tiers is not persistence vs. no-persistence—it’s about identity, scope, and governance:
  • Tier 0: Persistence tied to a localStorage session ID, isolated to localhost
  • Tier 1: Persistence tied to user identity (ID token sub claim), cross-app capable
  • Tier 2: Same as Tier 1, plus governance controls
This unified architecture means moving between tiers doesn’t change how the agent works—only what capabilities are available.

Further Reading