Skip to main content

Documentation Index

Fetch the complete documentation index at: https://glide-9da73dea.mintlify.app/llms.txt

Use this file to discover all available pages before exploring further.

Issue a scoped virtual card against the agent sub-vault. The card carries its own MCC filters, funding cap, and expiry independent of the envelope.

Metadata

FieldValue
Namecards.issue
Categorywrite
Required scopecards:manage
Idempotency key requiredyes

Annotations

AnnotationValue
TitleIssue Virtual Card
Read-onlyno
Destructiveno
Idempotentyes
Open-worldno
Requires human approvalno

Input schema

{
  "$schema": "https://json-schema.org/draft/2020-12/schema",
  "type": "object",
  "properties": {
    "card_label": {
      "type": "string",
      "minLength": 1,
      "maxLength": 100
    },
    "funding_cap_cents": {
      "type": "integer",
      "minimum": 0,
      "maximum": 9007199254740991
    },
    "expires_at": {
      "type": "string",
      "format": "date-time",
      "pattern": "^(?:(?:\\d\\d[2468][048]|\\d\\d[13579][26]|\\d\\d0[48]|[02468][048]00|[13579][26]00)-02-29|\\d{4}-(?:(?:0[13578]|1[02])-(?:0[1-9]|[12]\\d|3[01])|(?:0[469]|11)-(?:0[1-9]|[12]\\d|30)|(?:02)-(?:0[1-9]|1\\d|2[0-8])))T(?:(?:[01]\\d|2[0-3]):[0-5]\\d(?::[0-5]\\d(?:\\.\\d+)?)?(?:Z))$"
    },
    "mcc_allowlist": {
      "type": "array",
      "items": {
        "type": "string",
        "minLength": 4,
        "maxLength": 4
      }
    },
    "mcc_blocklist": {
      "type": "array",
      "items": {
        "type": "string",
        "minLength": 4,
        "maxLength": 4
      }
    },
    "idempotency_key": {
      "type": "string",
      "minLength": 8,
      "maxLength": 128
    }
  },
  "required": [
    "card_label",
    "funding_cap_cents",
    "idempotency_key"
  ],
  "additionalProperties": false
}

Output schema

{
  "$schema": "https://json-schema.org/draft/2020-12/schema",
  "type": "object",
  "properties": {
    "card_id": {
      "type": "string",
      "format": "uuid",
      "pattern": "^([0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[1-8][0-9a-fA-F]{3}-[89abAB][0-9a-fA-F]{3}-[0-9a-fA-F]{12}|00000000-0000-0000-0000-000000000000|ffffffff-ffff-ffff-ffff-ffffffffffff)$"
    },
    "last4": {
      "type": "string",
      "minLength": 4,
      "maxLength": 4
    },
    "issued_at": {
      "type": "string",
      "format": "date-time",
      "pattern": "^(?:(?:\\d\\d[2468][048]|\\d\\d[13579][26]|\\d\\d0[48]|[02468][048]00|[13579][26]00)-02-29|\\d{4}-(?:(?:0[13578]|1[02])-(?:0[1-9]|[12]\\d|3[01])|(?:0[469]|11)-(?:0[1-9]|[12]\\d|30)|(?:02)-(?:0[1-9]|1\\d|2[0-8])))T(?:(?:[01]\\d|2[0-3]):[0-5]\\d(?::[0-5]\\d(?:\\.\\d+)?)?(?:Z))$"
    },
    "policy_version": {
      "type": "integer",
      "minimum": 0,
      "maximum": 9007199254740991
    }
  },
  "required": [
    "card_id",
    "last4",
    "issued_at",
    "policy_version"
  ],
  "additionalProperties": false
}

Auth

Caller’s grant must include the cards:manage scope. Grants whose scope set is a superset of the required scope are accepted.

Request examples

curl -X POST https://mcp.glide.co/mcp/write \
  -H "Authorization: Bearer $GLIDE_GRANT_TOKEN" \
  -H "Content-Type: application/json" \
  -d '{
    "jsonrpc": "2.0",
    "id": 1,
    "method": "cards.issue",
    "params": {
      "card_label": "AWS Cloud Infra — May 2026",
      "funding_cap_cents": 50000,
      "expires_at": "2026-06-01T00:00:00Z",
      "mcc_allowlist": ["7372", "7379"],
      "single_use": false,
      "idempotency_key": "aws-infra-card-may2026-001"
    }
  }'

Response examples

Success — card issued with one-shot details envelope:
{
  "jsonrpc": "2.0",
  "id": 1,
  "result": {
    "card_id": "d4e5f6a7-b8c9-0123-defa-234567890123",
    "last4": "4242",
    "issued_at": "2026-05-04T08:00:00Z",
    "policy_version": 2,
    "details_envelope": {
      "pan": "4111111111114242",
      "cvv": "737",
      "expiry_month": "06",
      "expiry_year": "2026",
      "billing_address": {
        "line1": "340 Pine St Suite 800",
        "city": "San Francisco",
        "postal_code": "94104",
        "country": "US"
      }
    }
  }
}
Idempotent re-call (same idempotency_key) — details_envelope absent:
{
  "jsonrpc": "2.0",
  "id": 1,
  "result": {
    "card_id": "d4e5f6a7-b8c9-0123-defa-234567890123",
    "last4": "4242",
    "issued_at": "2026-05-04T08:00:00Z",
    "policy_version": 2,
    "details_envelope": null
  }
}
Funding cap exceeds the tightest envelope cap:
{
  "jsonrpc": "2.0",
  "id": 1,
  "error": {
    "code": -32602,
    "message": "card funding_cap 50000 exceeds tightest envelope cap 25000 (per_tx=25000, per_day=unset, lifetime=unset)",
    "data": { "reason_id": "funding_cap_over_envelope" }
  }
}

Errors

CodeNameCauseRemediation
-32600Invalid requestMalformed JSON-RPC envelopeCheck method, jsonrpc, and id fields
-32602Invalid paramsfunding_cap_cents exceeds the tightest envelope cap; MCC code not 4 digits; envelope has no amount caps definedLower funding_cap_cents or update the envelope caps first
-32001UnauthorizedMissing/expired grant tokenRefresh via agent.grant.refresh
-32002Policy deniedGrant missing cards:manage scopeIssue a new grant with the required scope
-32603Internal errorIssuer-side card creation failedRetry with the same idempotency_key; the response will be idempotent

Step-up flow

cards.issue does not itself trigger step-up — the Requires human approval annotation refers to the parent agent.budget.create saga that provisions the vault the card is drawn against. Cards issue freely once the vault is active and funding_cap_cents stays within the envelope. If the issuing vault was originally configured with a step_up_amount_cents threshold and you are issuing a card whose funding_cap_cents exceeds that threshold, you will need a step-up-approved grant before calling this tool. Obtain one via agent.grant.issue (which always requires step-up). See Step-up protocol for the full flow. For payments.initiate — which does trigger inline step-up — see the payments.initiate step-up flow.