Sandbox / Deployment
Deployment and capabilities
Demo metadata describing what this sandbox demonstrates and what the live reference exposes. The mock AS/RS metadata advertises sandbox-prefixed endpoints; agents and engineers can discover the surface from these documents.
Connectors
3
Streams
4
Records
9
Capabilities tracked
8
Connector manifests (simulated)
- Acme Payroll (simulated)
acme_payroll_demo· native · schedule weeklyStreams: pay_statements, tax_documents - Northwind Health (simulated)
northwind_health_demo· polyfill-registered · schedule manualStreams: clinical_visits - Fabrikam Bank (simulated)
fabrikam_bank_demo· native · schedule dailyStreams: transactions
Capabilities matrix
- scoped_grant_issuanceOwner approves a request restricted to specific streams and fields.
See grant_sb_quill_paystmt and the /sandbox/walkthrough story.live: ✓demo: ✓ - grant_revocationOwner can revoke an outstanding grant; subsequent reads are refused.
See grant_sb_ledger_txns_revoked.live: ✓demo: ✓ - consent_declineOwner can decline a request without minting a grant.
See grant_sb_sherwood_visits_denied.live: ✓demo: ✓ - stream_schema_discoveryClients enumerate available streams and field schemas before requesting.
GET /sandbox/v1/schema and /sandbox/v1/streams.live: ✓demo: ✓ - lexical_searchOperator can search retained records by free-text keywords.
GET /sandbox/v1/search.live: ✓demo: ✓ - single_use_accessA grant can be marked single-use so it cannot be replayed.
Single-use semantics are visible in walkthrough JSON; not yet enforced by sandbox API.live: ✓demo: — - token_introspectionAuthorization server exposes RFC 7662-style introspection.
Introspection is a normative reference feature; sandbox documents it but does not stub it.live: ✓demo: — - semantic_searchVector-backed semantic search over retained records.
Sandbox uses lexical search only; semantic backend requires a model cache.live: ✓demo: —
AS metadata
Reachable at /sandbox/.well-known/oauth-authorization-server.
{
"is_demo": true,
"notice": "Sandbox demo: deterministic fictional data. Not a live PDPP reference instance.",
"issuer": "https://pdpp-smoky.vercel.app/sandbox",
"authorization_endpoint": "https://pdpp-smoky.vercel.app/sandbox/authorize",
"pushed_authorization_request_endpoint": "https://pdpp-smoky.vercel.app/sandbox/par",
"token_endpoint": "https://pdpp-smoky.vercel.app/sandbox/token",
"introspection_endpoint": "https://pdpp-smoky.vercel.app/sandbox/introspect",
"revocation_endpoint": "https://pdpp-smoky.vercel.app/sandbox/revoke",
"grant_types_supported": [
"authorization_code",
"urn:pdpp:params:oauth:grant-type:scoped_grant"
],
"response_types_supported": [
"code"
],
"scopes_supported": [
"stream:pay_statements:read",
"stream:tax_documents:read",
"stream:clinical_visits:read",
"stream:transactions:read"
],
"pdpp_demo": {
"note": "Sandbox demo metadata. The real reference advertises live AS endpoints under the deployment origin.",
"streams_endpoint": "https://pdpp-smoky.vercel.app/sandbox/v1/streams",
"schema_endpoint": "https://pdpp-smoky.vercel.app/sandbox/v1/schema",
"search_endpoint": "https://pdpp-smoky.vercel.app/sandbox/v1/search"
}
}RS metadata
Reachable at /sandbox/.well-known/oauth-protected-resource.
{
"is_demo": true,
"notice": "Sandbox demo: deterministic fictional data. Not a live PDPP reference instance.",
"resource": "https://pdpp-smoky.vercel.app/sandbox",
"authorization_servers": [
"https://pdpp-smoky.vercel.app/sandbox"
],
"bearer_methods_supported": [
"header"
],
"resource_documentation": "https://pdpp-smoky.vercel.app/docs",
"scopes_supported": [
"stream:pay_statements:read",
"stream:tax_documents:read",
"stream:clinical_visits:read",
"stream:transactions:read"
],
"pdpp_demo": {
"note": "Sandbox demo metadata. Advertises sandbox-prefixed endpoints; not a live RS.",
"streams_endpoint": "https://pdpp-smoky.vercel.app/sandbox/v1/streams",
"record_endpoint_template": "https://pdpp-smoky.vercel.app/sandbox/v1/streams/{stream}/records/{recordId}",
"search_endpoint": "https://pdpp-smoky.vercel.app/sandbox/v1/search"
}
}