Loading...
Loading...
Current-state technical specification for RapidClaw: Dataverse as the control boundary, Azure as the customer-owned runtime, Teams as the user surface, and OpenClaw as the on-VM agent runtime.
RapidClaw is a Microsoft-cloud-native AI operations layer for RapidStart CRM. It combines:
The product is designed to let a customer deploy a governed, tenant-isolated AI agent environment into their own Azure subscription without requiring CLI-based setup. The primary operator experiences are:
This document describes the product as it exists now, not the earlier design target. Where a capability is partial or explicitly still in transition, it is called out as such.
RapidClaw is not a generic chatbot and not a standalone CRM. It is an AI agent layer on top of RapidStart CRM with three core responsibilities:
In practical terms, RapidClaw gives a RapidStart CRM customer:
By design, a fresh deployment is provisioned in a non-live posture. Agents, scheduled jobs, and other runtime behaviors that could produce autonomous activity are not assumed to become active immediately at install time. Operators are expected to review and explicitly activate those capabilities in RapidClaw Command Center.
RapidClaw is built around a deliberate separation of concerns:
The browser is an operator console, not the deployment engine. The customer VM is a runtime substrate, not a source of business truth. Dataverse remains the canonical source for configuration, runtime metadata, policy, and audit records.
This architecture exists for three reasons:
RapidClaw is intentionally split into four planes.
1. RapidStart CRM / Dataverse plane
fw_ClawConfig, fw_ClawAgent, fw_ActionPolicy, fw_InteractionLog, fw_AgentMemory, fw_Deployment, fw_DeploymentStep, fw_DeploymentEvent
2. Forceworks deployment plane
3. Customer runtime plane
nginx, oauth2-proxy, OpenClaw gateway/runtime, RapidClaw Command Center, rapidclaw-memory, Graph helper / MCP support, and rapidclaw-bot-forwarder
Key Vault, Azure OpenAI, networking/security resources, and customer-owned Bot Service ingress
4. User-facing surfaces
At a high level, the flow is:
RapidClaw is notable because it is not merely “integrated with Microsoft”; it is built almost entirely from Microsoft platform components:
One of RapidClaw’s strongest product characteristics is that it extends the existing business application estate while staying inside the same control, identity, and data boundaries as the surrounding platform.
RapidClaw deploys into a customer-owned Azure subscription. The canonical runtime unit is a dedicated resource group and Ubuntu VM per customer deployment. The deployment process uses deterministic naming with a short deployment suffix to avoid stale-resource collisions and to support redeploy/reset flows cleanly.
Provisioning begins in the Dataverse-hosted RapidClaw setup wizard. The wizard still matters because some steps are inherently user-scoped and browser-mediated:
After that, responsibility increasingly shifts to the backend deployment service.
The current setup flow includes a Step 2 prerequisite gate. After the operator selects a subscription and region, the wizard calls the deployment service preflight endpoint to check subscription access, provider readiness, and Azure OpenAI / Foundry model availability and capacity. Step 3 deployment is blocked until the current subscription/region/release preflight passes. This prevents the user from starting a long deployment that is already known to fail for missing model capacity or subscription prerequisites.
RapidClaw does not treat deployment completion as permission to begin autonomous operation. New environments are provisioned in a controlled non-live state:
This deliberate safety choice gives the customer a review window between "the environment exists" and "the environment is allowed to act."
The deployment service currently exposes these first-class HTTP functions:
POST /preflightPOST /deploymentsGET /deployments/{id}POST /deployments/{id}/retryPOST /deployments/{id}/cancelPOST /deployments/{id}/resetPOST /deployments/{id}/teams-deploymentPOST /deployments/{id}/agents-teamGET /release/configThe service:
fw_Deployment* records in DataverseRapidClaw is mid-migration from a browser-exposed deployment API key model toward Entra JWT-based backend authorization. Current code prefers JWT validation with strict tenant binding and retains a controlled legacy fallback for rollback safety in some paths. This is an important maturity step because it moves deployment authorization closer to standard Microsoft enterprise patterns.
As of this snapshot:
This is a meaningful transition state: RapidClaw is no longer a browser-driven installer, but it is not yet a fully headless backend deployment pipeline either.
RapidClaw uses Dataverse as the authoritative business and control boundary.
In practice, that means Dataverse is the system of record for what RapidClaw is, what it is allowed to do, and what state it is in. Local VM files, workspace prompts, temporary memory artifacts, and runtime-generated support files exist to help the runtime execute, but they are not the authoritative source of product truth.
fw_ClawConfigfw_ClawAgentfw_ActionPolicyfw_AgentMemoryfw_InteractionLogfw_Deployment / fw_DeploymentStep / fw_DeploymentEventDataverse is doing more than storing configuration:
This is an important differentiator: RapidClaw does not externalize the governance surface into a disconnected control plane. It keeps the control model anchored in Dataverse while still using Azure for the runtime substrate.
Operationally, that means if a runtime file and a Dataverse record disagree, the Dataverse record should be treated as authoritative. Workspace files such as prompts, local memory artifacts, and supporting markdown files are execution material; Dataverse holds the approved configuration, policy, deployment state, and business-facing control data.
The customer VM runs the RapidClaw runtime stack:
OpenClaw is the on-VM execution engine. RapidClaw layers:
At deployment time, the installed OpenClaw version is the current version available at that moment, rather than a separately pinned long-term RapidClaw-specific runtime channel. This keeps deployments close to the current OpenClaw release line, but it also introduces regression risk: a newly available upstream OpenClaw release can change runtime behavior, plugin behavior, UI behavior, or operational assumptions between customer deployments.
For that reason, future OpenClaw runtime updates should be treated as an explicit administrative action rather than an implicit background behavior. The intended advanced-user surface for those runtime updates is OpenClaw Admin.
The product boundary between OpenClaw and RapidClaw is important:
RapidClaw should not be read as a cosmetic wrapper around OpenClaw. The core product value is in the governed operating model built around the runtime, not just in exposing the underlying runtime itself.
The runtime is operationally useful today but not yet fully at the durability target described in the older specification:
RapidClaw is already a real product runtime, but the gateway-side “governed job system” maturity is still evolving.
RapidClaw deploys a named agent team rather than a single monolithic assistant.
Current shared team definitions include:
orchestrator)account-health) — account healthcontact-health) — contact healthprospect-qualifier) — prospect qualificationopportunity-chaser) — opportunity accelerationcustomer-service) — customer servicerelationship-intelligence) — relationship intelligencepp-builder) — Power Platform builderprospect-qualifier-reader, opportunity-chaser-reader, customer-service-reader, and relationship-intelligence-reader
The key interaction model is that end users do not independently converse with all of these agents. In Teams and other normal product surfaces, the user interacts with the RapidClaw orchestrator. The orchestrator is responsible for deciding when specialist agents or reader agents should be involved, coordinating those handoffs, and returning a unified response.
Once activated, the specialist roles are intended to behave roughly as follows:
Activation therefore is not just "turning on an agent name." It is enabling a governed role in the overall team model, with expected responsibilities, policy boundaries, and operational consequences.
The reader agents are worth calling out explicitly because they are part of the product's control posture, not just an implementation detail. They sit between raw user input or delegated work and the higher-trust specialist paths, and are used to:
The shared workspace/_shared/AGENTS.md is authoritative for all agents, including delegated/sub-agent paths. It encodes:
This is a strong operational design choice: one shared policy surface governs the agent team, making product behavior more consistent and inspectable than ad hoc prompt sprawl.
The agent team is not a flat set of equally privileged conversational actors. There is a deliberate trust and coordination model:
The orchestrator is powerful, but not unconstrained. Its role is to coordinate work within policy, not to bypass the control model. Likewise, specialists are intentionally narrower than the orchestrator; they exist to improve domain quality and boundedness, not to become parallel unsupervised user-facing assistants.
Recent instruction updates also push the orchestrator toward answering directly when it already has enough CRM context. Specialist delegation is still supported, but it should not be the default for every non-trivial user message. The intended pattern is:
RapidClaw distinguishes between provisioned, configured, and live:
A fresh environment can be fully deployed without being allowed to act. Activation is the point at which a customer intentionally permits a role, schedule, or interaction path to participate in day-to-day operation.
RapidClaw today is best characterized as a bounded multi-agent assistant with selective automation, not as a fully autonomous back-office worker. It can:
It is also not intended to go live by accident. The product assumes operators will use RapidClaw Command Center to decide when specific agents, schedules, and operational behaviors should be activated.
From a product perspective, "activation" should be understood as an administrative approval to let a specific role or schedule participate in live operation. A deployed environment can therefore be healthy and fully provisioned while still intentionally not acting until those activation choices have been made.
The more advanced “safe execution modes / approval-required runtime / durable interrupted-job review” model remains an explicit next-stage maturity target rather than a fully completed capability today.
RapidClaw currently ships a personal-scope Teams bot app with:
scopes: ["personal"]supportsFiles: trueThis defines what the current product actually supports:
@mention participation in arbitrary team or group chat contextsIt also means Teams access is not universal by default. The Teams app must be deployed and made available through the Teams admin center, and access can be limited to specific users rather than exposed to everyone in the tenant. That is an important part of the safety model: limiting who can directly interact with RapidClaw is one of the controls available to the customer.
RapidClaw now provisions a customer-owned Azure Bot Service in the customer resource group. The Teams app points Bot Framework traffic at that customer-owned bot endpoint, and the bot forwards messages directly to the customer VM at /api/messages.
This pattern gives RapidClaw:
The Forceworks shared router still exists as a fallback and diagnostic path during transition, but it is no longer the intended primary path for day-to-day Teams conversations.
On the customer VM, rapidclaw-bot-forwarder:
/api/bot/forward for the legacy shared-router fallbackThis path is functionally solid today, but still has meaningful latency overhead because it spawns the OpenClaw CLI/runtime path per message. Recent testing showed that direct Azure OpenAI calls from the VM are fast, while full OpenClaw CLI turns can be much slower even for small prompts. That makes Teams message latency a first-class roadmap item rather than a Teams/Bot Framework issue.
The current mitigation is intentionally conservative:
The intended next-stage improvement is a supported persistent OpenClaw session or lower-latency invoke path that avoids CLI startup per Teams message without bypassing policy, logging, or agent coordination.
From the end-user point of view, Teams is still a conversation with the RapidClaw orchestrator. The specialist agents are behind that surface. Users are not expected to choose among Alex, Casey, Quinn, Morgan, Jordan, Riley, or Cody directly in normal Teams operation; the orchestrator coordinates with them as needed.
Recent product work materially improved the Teams admin experience:
msteams plugin ingress assumptionsEnterprise trust is built not just on successful deployment, but on whether the operational surfaces tell the truth.
RapidClaw now has an initial Teams file-delivery bridge for agent-produced markdown deliverables:
As of this snapshot, this is Phase A of the capability:
This shows that RapidClaw is not limited to pure chat text; it is actively evolving into a richer Teams-native assistant surface.
RapidClaw Command Center is the operational web application deployed on the customer VM and exposed under /dashboard.
Current surfaces include:
RapidClaw Command Center is where RapidClaw becomes a product rather than just a deployment:
RapidClaw Command Center is one of the strongest productization elements in the current repo. It turns what could have been an internal runtime into an operator-facing management experience with clear operational boundaries.
The current sidebar branding uses the RapidClaw icon as an image and renders the product words as live text: RapidClaw and Command Center. This keeps the in-product treatment aligned with the public preview while avoiding a single baked wordmark image.
The current Model Operations page is a non-functional preview. It is intentionally present so administrators can see the intended direction:
The current production deployment flow already attempts to select available models and avoid mini-class orchestrators, but the full interactive model-management surface remains roadmap work.
The setup wizard now includes a pre-deploy model prerequisite check. If the selected subscription and region cannot support the required GPT-5-family deployment shape, the user is guided before Step 3 deployment begins rather than discovering the issue during ARM deployment.
Command Center includes a Bug Report page that posts reports to Forceworks through a Power Automate workflow. The report includes user-entered issue details plus background context such as Command Center version, host, Dataverse URL, tenant id, browser, viewport, and optional screenshot content.
The current implementation treats a Power Automate NoResponse 502 as an accepted submission because that condition indicates the workflow was invoked but did not return an HTTP acknowledgement. The preferred flow configuration remains an explicit HTTP 200 response action.
OpenClaw Admin remains available for advanced users who want lower-level runtime access, diagnostics, or direct interaction with the underlying OpenClaw surface. It is not intended to be the primary day-to-day operating experience.
The system is designed so that normal administration can happen from RapidClaw Command Center:
OpenClaw Admin is a power-user surface; RapidClaw Command Center is the productized administration surface.
It is also the appropriate place for future OpenClaw runtime update actions. In other words: Command Center is where the product is operated, while OpenClaw Admin is where advanced users can manage the underlying OpenClaw runtime when that is necessary.
The repo now includes a static customer-preview artifact under customer-preview/command-center. It is not the production Command Center and has no live API calls. It exists so the public website can show a simulated copy of the Command Center with representative demo data, full agent roster, readiness cards, policy examples, model-operations preview, Teams status, email settings, usage/cost summary, and bug-report mock-up.
The preview should be described as a simulated UI, not as a live customer telemetry surface.
RapidClaw’s current security story is stronger than “LLM with CRM access,” but still intentionally honest about what remains to be hardened.
This is the right posture for sophisticated readers: RapidClaw is governed and enterprise-aligned today, but it is not pretending that the entire maturity roadmap is already complete.
RapidClaw is also designed to degrade in understandable layers rather than treating every failure as a total product failure:
The operating principle is straightforward: not every partial failure should erase operator visibility. The product should preserve truthful status even when a surface or integration is degraded.
The customer:
fw_Deployment* progressAfter deployment, operators use RapidClaw Command Center and Teams to:
Day-2 operation is not just "the bot is running." A healthy operating pattern includes:
This is part of the product story: RapidClaw is meant to be operated, not merely installed.
Three concrete flows are useful for understanding how the system actually behaves:
/api/messagesfw_Deployment* records in DataverseReset and lifecycle teardown are now increasingly service-owned rather than browser-owned. This is a major maturity improvement because it moves destructive orchestration into durable backend workflows with step tracking instead of a fragile page-local process.
The key point is not simply that these items remain. It is that RapidClaw already has a coherent, shippable product core while those next-stage controls are being added.
RapidClaw is compelling because it demonstrates a very specific pattern:
AI agents deployed into the customer’s Azure estate, governed through Dataverse, surfaced through Teams, and operated through a platform-native control plane.
That matters because it aligns with real enterprise buying and architecture concerns:
This is not “AI glued onto CRM.” It is a serious attempt to make AI operations feel native to the surrounding business cloud, identity, and collaboration stack.
RapidClaw today is:
Its strongest differentiator is not any single model or prompt. It is the combination of:
That combination is the product.