Skip to main content
Private Preview· Early access by invitation. Request access →
Kirimana.
Sign in Early access
Standards

Standards + integrations

Kirimana stands on open standards. Every integration is documented, versioned, and shipped Apache-2.0. We don’t lock you in; we plug you in.

Open standards we conform to

StandardWhat we use it for
ODCS v3 (Open Data Contract Standard)Canonical contract format. Extended via documented kirimana.* customProperties namespaces.
Apache IcebergFirst-class lakehouse format. Direct-write peer adapter sits next to Trino-mediated.
Apache Polaris (incubating)Iceberg metadata catalog. Bidirectional sync.
OpenLineageLineage emission from apply and ingestion.
OAuth 2.0 / OIDCAuth + SSO delegation across providers.

Frameworks we wrap or extend

FrameworkWhat we do with it
dbt-coreFirst-class transformation framework. We wrap dbt-core; we don’t replace it. Adapters for DuckDB, Databricks, Fabric, Trino, Postgres, MSSQL.
Apache RangerPushes contract classification into row/column policies.
Great ExpectationsData quality framework backing the quality layer.

Source-system integrations (ingest)

IntegrationDefault?Notes
Airbyte✓ recommendedPrimary ingest backend; OAuth2 client-credentials
dltoptionNative Python pipelines
DebeziumoptionCDC streaming family
Apache KafkaoptionStreaming platform adapter (consumer, offsets, DLQ)
Native landing-zone (S3/ABFSS/GCS)optionBronze ingestion from object storage
REST APIs (custom)optionPull-mode REST + OAuth2
SOAPoptionLegacy XML envelope mode
Database direct (JDBC/ODBC)optionFor existing OLTP sources
Confluent Schema Registry✓ supportedStreaming schema discovery
AWS Glue✓ supportedSchema registry for AWS-native sources

Catalog integrations (pass-through, not replacement)

Critical positioning: Kirimana is not a catalog replacement. We are a contract layer that pushes truth to whatever catalog the customer prefers. The catalog stays the user-facing metadata surface; Kirimana is the source of contract truth feeding it.

CatalogModePer edition
Databricks Unity Catalogpush + pullPrimary for Kirimana for Databricks
Microsoft Purviewpush + pullPrimary for Kirimana for Fabric
Snowflake Horizonpush + pullCross-edition
Apache Polaris (incubating)push + pullPrimary for Kirimana Enterprise OSS
AWS Glue Data CatalogpushAWS-native metadata
Atlan / Collibra / Alationpush (adapter shelf)Available via Pro Services adapters

AI integrations

IntegrationWhat it is
Anthropic ClaudePrimary LLM via the AI gateway. Always uses prompt caching.
Azure OpenAIRouted via AI gateway for Microsoft-stack tenants.
AWS BedrockClaude / Llama / others via the gateway.
OllamaLocal / air-gapped LLM provider.
Databricks AI AssistantsMCP server lets the AI assistants read contracts, classifications, lineage, AI policy, release status — all gated by the same classification rules.
External AI assistants via MCPClaude.ai, Cursor, Continue.dev, Cline — read Kirimana via the same MCP server.
Anthropic prompt cachingAlways-on for Kiri prompts and AI gateway calls.

DevOps + GitHub

IntegrationWhat it is
GitHubFederated contract library backend (storage in repo, discovery on website, engagement via Stars/Forks/Issues).
GitHub ActionsPR-time contract lint, two-approver gate for redaction events, schema-drift detection.
CODEOWNERSWired into the contract-approval workflow.
Conventional commits + SemVerThe release plan / apply / verify lifecycle stamps releases against the git SHA.

Incident + ITSM dispatch

IntegrationModeDedup key
JiraREST v3custom-field source_id
ServiceNowTable APIcorrelation_id
ZendeskREST v2external_id
Generic webhookPOST + signed headerssource_id

The detection layer routes apply-failures, SLA breaches, schema-drift, and health events through the dispatcher.

Communication

IntegrationWhat it is
SlackBot for governance queries — “who owns customer.yml?”, “what’s the AI policy on silver.payments?”, “show me the latest apply for domain X”. Read-only bot; mutating actions go through the Streamlit UI.
Microsoft TeamsSame surface as Slack via the bot’s adapter.

Auth

ProviderMode
OIDC genericAny OIDC IdP
GitHubOAuth + OIDC
Microsoft Entra IDOIDC for Microsoft tenants
Okta / Auth0OIDC

The PR-time RBAC gate enforces capabilities per role (.github/workflows/contract-approval.yml).

Vault / secret management

ProviderNative?
Azure Key Vault
AWS Secrets Manager
GCP Secret Manager
HashiCorp Vault
Databricks Secret Scopes
env-based (dev only)

All ${vault:...} references resolved by the active vault adapter. CI fails on detected plaintext.

BI + semantic layer (export)

TargetMode
dbt Semantic Layerexport
MetricFlowexport
Cubeexport
Power BIconnection guide
Tableauconnection guide
Qlikconnection guide

Compliance generators

StandardStatus
DORA (EU operational resilience)built-in generator
EU AI Actbuilt-in generator
GDPR (Art. 17 redaction etc.)built-in generator + redaction surface
SOC 2scoped via Pro Services
ISO 27001scoped via Pro Services

Adapter shelf (Pro Services, not in OSS)

These exist as adapters customers can pay Pro Services to install and maintain — they are not in the public OSS distribution:

  • Atlan / Collibra / Alation catalog push
  • Snowflake Horizon advanced bidirectional sync
  • Proprietary streaming sources
  • Proprietary BI semantic layers (Looker, ThoughtSpot)

Want a new integration?

  • GitHub Issue for an OSS adapter request — community decides prioritisation
  • Pro Services for a paid implementation against your stack
  • PR welcome — the PlatformAdapter ABC is documented and tested with golden files; community-contributed adapters are reviewed and merged