Von is a revenue intelligence platform. Its agents handle the prep work before reps ever open a tab: surfacing quiet deals, updating records after calls, pulling meeting context on demand.
Every enterprise Von signs runs its own stack of Salesforce, Gong, Snowflake, HubSpot, and a dozen more. Each agent has to act inside those systems, as the rep, under that rep's permissions. Identity was the unlock that made it possible.
When an agent acts on behalf of a user, the auth layer carries a lot. Tokens have to stay valid, scoped to what the user authorized, refreshed on schedule, and never leaked into agent runtime or LLM context. That contract holds across every connector and every org Von onboards, without rewriting auth code for each new customer.
Our agents act across Salesforce, Gong, Google Drive, and dozens more, on behalf of every rep. Scalekit handles the credentials and the tool calling underneath, which lets us keep shipping connectors without rebuilding the auth layer.
In most agent codebases, credentials leak everywhere: tokens in env vars, secrets in config files, refresh logic glued in by hand. Von's agents do none of that. They call a tool with a connected account ID, and Scalekit resolves the user, pulls a scoped token from the vault, executes the call, and returns the result.
Every enterprise system picks its own auth pattern. Salesforce expects delegated OAuth. Snowflake expects RSA key-pairs. Azure AD expects its own enterprise app registration. Every customer expects Von to handle whichever flavor they happen to run. Scalekit covers the whole matrix, so Von's team never writes the plumbing.
Some apps publish MCP servers built specifically for agents to consume. Von accesses them through Scalekit, which gives its agents richer tool descriptions, cleaner discovery, and better outcomes than a generic REST wrapper could deliver. For tools that don't exist in any catalog, customers bring their own MCP servers shaped to their internal workflows, and Von's agents work with them as if they were native.
Granola and Notion ship official MCP servers Von routes through today. Scalekit issues a properly scoped token carrying org identity, so the agent never sees the credential and the MCP server gets a request it can trust. Same path covers customer-built servers running on private infra.
Plenty of enterprise stacks include tools no other customer runs: an internal API server, a private data warehouse, a homegrown CRM. Von's team registers each of these as a custom connector tailored to that customer's needs. From the moment it goes live, the connector inherits the same token vault, proxy, auth lifecycle, and audit trail as every prebuilt integration.
Von ships one platform across many enterprise customers. Each customer gets fully isolated credentials, and every agent operates within that org's connected systems — scoped to each user's permissions across every tool call.
Every enterprise deal eventually runs into one question: prove what an agent did, for which user, under what scope. Scalekit answers it by default. Each tool call routes through the proxy, where the agent, user, tenant, tool, scope, and duration land as a structured audit event, with zero custom instrumentation in Von's code. Security reviews close faster, SOC2 evidence is one query away, and Von's team ships revenue agents instead of a logging pipeline to defend them.
Von · Head of Engineering
We looked hard at building the token vault, the proxy layer, and per-user credential isolation ourselves. The honest answer was months of infra work upfront, and then chasing every connector's auth quirks forever. Scalekit is that infrastructure.
Venu Madhav Kattagoni · Head of Engineering, Von
Every enterprise customer gets agents acting under their users' permissions, with isolated credentials and a complete audit trail behind them. Von's team spent its time shipping revenue agents, not rebuilding identity infrastructure.
An agent calls a tool with a connected account ID. Scalekit resolves the user, pulls a scoped credential from the vault, executes the call, and returns the result. Zero tokens in agent code, zero tokens in LLM context.
Each connector uses whichever auth pattern the underlying system actually wants, from OAuth to RSA key-pairs to static API keys to Azure AD. The registry handles the flow. Von defines the provider, never the plumbing.
Every tool call is captured at the proxy — agent, user, tenant, scope, and duration. No logging code in Von's stack. Security reviews and customer audits answered by architecture.
Tool calling, custom connectors, multi-tenant isolation, and full audit trail. The infrastructure ships out of the box.



We use cookies, so things load fast, we learn what to fix, and you can always reach us on chat