Governed execution infrastructure.

Operational readiness gated by typed substrate. Refusal as a first-class outcome. Honest unknowns rendered as their own state.

Nine ordered blocker layers. Each typed, owned, and visible.

Orchestrate's readiness state is not a single status. It is nine canonical layers — billing, sending domain, mailbox, provider health, governance, continuity window, pacing, campaign, data — each typed, each owned (client, Orchestrate, or operator), and each rendered as its own honest state.

Each layer maps to a typed readiness bucket: ready to execute, executing, recovering, degraded, Orchestrate working, client action required, or Orchestrate blocked internal. Seven buckets, derived deterministically from thirteen finer execution states.

An operator looking at a tenant sees the state at every layer at once. A degraded reputation reads as degraded on the pacing layer. A missing import reads as client action required on the data layer. The platform does not average across layers; each layer answers honestly.

  • BillingSubscription + payment method state
  • Sending domainSPF / DKIM / DMARC verification
  • MailboxAuthorization scope + capability + identity class
  • Provider healthAI provider reachability + latency
  • GovernanceMode resolution + sector + tenant preference
  • Continuity windowExecution window + run cadence
  • PacingReputation + cooldown + throttle
  • CampaignCampaign state + template health + source bindings
  • DataLead queue + import recency + import due

Honest unknowns. Verification has three states, not two.

Most operational systems collapse verification into pass-or-fail and call partial knowledge an error. Orchestrate treats unknown as a legitimate state — the platform does not yet know, and the right behavior is to say so.

The triad

  • PASSVerified
  • FAILExplicitly failed
  • UNKNOWNCannot yet evaluate — not failure, not pass

When the platform doesn't know, it says so. A coerced pass on an unverified gate is a lie that compounds downstream.

Why this matters

An optimistic pass on DMARC sends mail before the domain is actually verified, damaging reputation when the eventual evaluation returns fail. An honest unknown holds the send until the platform has substantively confirmed the state.

This three-state verification applies to every verification surface in Orchestrate. Audit reconstructions show what the platform honestly believed at each moment. Operator cognition stays accurate. Procurement reviewers see operational honesty as a first-class outcome, not an exception.

Eight questions. Seven outcomes. Five do not send.

Before any outbound send proceeds, the dispatch governance service answers eight rationale questions and tests ten hardest-gate-first blockers. Seven typed dispatch decisions are possible. Only two of them dispatch.

The eight rationale questions

  • Why this prospectWhy this lead
  • Why nowWhy this moment
  • Why this mailboxWhy this sender
  • Why this askWhy this call to action
  • Why this confidenceWhy this evidence supports it
  • Why this toneWhy this voice
  • Why dispatch-safeWhy safe to send
  • Why silence is not saferWhy holding back isn't the better choice

The seven dispatch decisions

APPROVE   DEGRADE AND APPROVE

HOLD FOR CONTEXT   HOLD FOR REPUTATION   HOLD FOR REPLY RISK   HOLD FOR HUMAN REVIEW

BLOCK

A held send is never silent. The rationale, blockers, operational status, and timestamp persist on every decision — approved, held, or blocked.

Continuity is a window state, not a metric.

Orchestrate's continuity window layer answers a structural question, not a dashboard one: is the execution window open right now, when did the last run complete, when does the next run fire? The platform state is the truth.

Execution continuity isn't measured in "uptime percentage." It is rendered as state. The continuity layer holds the window open / closed condition, the timestamp of the last execution cycle, and the timestamp of the next scheduled cycle. Operators see this state directly; the platform does not compute it into a vanity metric.

Recovery is a posture, not a transition. When pacing degrades, the platform moves into a recovering state and stays there until conditions substantively improve. There is no animation pretending recovery is faster than it is.

Run cadence

  • Window openIs execution currently permitted
  • Last runUTC timestamp of last execution cycle
  • Next runUTC timestamp of next scheduled cycle
  • Window reasonWhy open or closed — typed

Risk can only escalate the governance mode. Never relax it.

Tenants choose a governance mode at install: autonomous, supervised, approval required, or draft only. Risk evaluation can move the mode toward more restrictive. It cannot move toward less restrictive. The platform enforces this asymmetry structurally.

The four modes

  • AutonomousRuntime decides and dispatches
  • SupervisedDispatches but flags for review
  • Approval requiredHuman must approve before dispatch
  • Draft onlyDrafts; never dispatches

Compounding

Two or more high risks compounding escalates the platform to draft-only — the runtime drafts but does not dispatch. The platform refuses to compromise this floor under any circumstance.

Tenant preference establishes the floor. Risk can only escalate above it. The runtime never relaxes the tenant's choice.

Holds route to operator workspace. Audit is metadata only.

When dispatch holds for human review or substantive intervention, the platform routes the typed outcome to a dedicated operator workspace. The audit log captures every decision — and only metadata.

Audit log doctrine: metadata only — never credentials, never message bodies. The platform persists what was decided, when, why, with what blockers, in what governance mode — at no point does the audit log capture the substantive content of an outbound message or any authentication material.

This isn't a privacy feature retrofitted onto the audit log. It is the audit log's structural doctrine. The platform enforces it.

Operator surface

The operator workspace renders the platform state at three resolutions: per-tenant, per-source, per-decision. The same nine readiness layers visible to clients are visible to operators. The same seven dispatch decisions and the eight-question rationale persist for substantive operator review.

Operator intervention is itself structural — typed audit edges flow from the operator's resolution back into the dispatch record. The operator does not act invisibly.

Exactly one operational truth object. Deterministically fingerprinted.

A single canonical truth object answers what is currently true. Constructed deterministically, fingerprinted for change detection, refreshed on a ~30-second cadence, and explicitly carrying its honest unknowns.

Most operational systems accumulate competing truth sources — caches, denormalized read models, snapshot tables. Each becomes its own claim, eventually inconsistent with the others. We resolved this at the architectural level: one truth object, one fingerprint, one source.

Every diagnostic surface, every operator decision, every customer-facing readiness display derives from this one object. Read models and caches exist for performance — they are derived from the truth, not parallel to it.

There must be exactly one operational truth object. The fingerprint changes only when something substantively changes. Honest unknowns are first-class state.

The fingerprint enables constant-time change detection across the system. Consumers ask did the truth I care about change? If yes, recompute. If no, the previous result is still valid.

Deterministic governors
DiscoveryRefillGovernor ReputationGovernor DispatchGovernanceService
AI cannot override the floor.

Read the architecture.

Every claim on this page is enforced by the platform itself. The architecture canon is documented openly. Procurement reviewers, substantive engineers, sectoral peers — read substantively.

Procurement, institutional, investor.

Orchestrate is governed managed-outbound execution infrastructure. Procurement reviewers, regulated-sector operators, and investors reach the founder by email.

Procurement & investor hello@auraplatform.org

Founder direct founder@auraplatform.org

Architecture canon Aura Platform LLC

Investor narrative Open the deck