From Monoliths to Maestros:
What SOMA, MOMA, and 3P Agents Mean for How We Build on Agentforce
Last quarter, I observed a flagship Agentforce deployment at a large financial services firm. The entire setup relied on a single agent powered by one extensive system prompt, expected to manage account queries, product questions, onboarding FAQs, and escalations all at once. The initial demo was flawless. However, about six weeks after going live, issues began to appear. The agent started blending account-specific logic with generic product responses. By that point, the system prompt had expanded beyond 8,000 tokens, and no one could pinpoint which instruction was triggering the incorrect outputs. It was a clear example of how quickly complexity can become difficult to control when everything is consolidated into one prompt.
This is the monolith trap, and it’s more common than anyone in the Agentforce community wants to admit. The Salesforce Architects team has published a clear, opinionated response to this problem: SOMA, MOMA, and a third-party (3P) agent integration model that collectively redefine what enterprise-scale Agentforce architecture actually looks like. I want to break it down with the architectural judgment this framework deserves.
The Real ProblemWhy the Monolithic Agentforce Agent Has a Ceiling
Monolithic Agentforce agents are the starting point, not the destination. For narrow, well-scoped use cases, a knowledge retrieval bot, a “summarize this Case” button on a page layout, a single agent is exactly right. But as enterprise complexity enters the picture, two problems emerge that no amount of prompt refinement can fix.
The first is attention dilution. When a single Agentforce agent carries topics, instructions, and actions spanning support, sales, billing, compliance, and technical troubleshooting simultaneously, reasoning quality degrades. The agent holds a lot of context, but reasons about it less precisely. Atlas Reasoning is powerful, but it’s not immune to the limits of what a single agent can reliably handle.
The second is maintainability collapse. When something goes wrong in production, and it will, you’re digging through one enormous system prompt to find the failure. No fault isolation. No modularity. No ability to test one domain without touching the entire agent.
This is exactly why Salesforce frames multi-agent architecture as enabling greater scale, control, and flexibility than monolithic systems. Individual Agentforce agents can be added, replaced, modified, and tested independently. When one component fails, it doesn’t compromise the entire system. That’s not a product claim, it’s a structural property of the architecture, and it matters enormously once you’re in production.
The Three Architectures
Core PatternsSingle Agent, SOMA, MOMA, and Exactly When to Apply Each
Because everything runs inside the same Salesforce org, specialists share native access to the same Case record, the same Contact, the same Data Cloud context, without complex API calls or separate authentication flows. This shared governance is the real architectural advantage over what comes next.
A concrete example from the Salesforce Architects documentation: a healthcare Member Services solution using SOMA. An Answerbot handles anonymous users. An Orchestrator manages authenticated members. Dedicated Domain SME agents cover Case management, Claims, and Benefits. Each agent is focused, independently testable, and replaceable without touching any other component.
What MOMA introduces architecturally: distributed state management, cross-org OAuth flows, and real latency. These aren’t reasons to avoid it; they’re engineering realities you need to plan for. Salesforce Data Cloud becomes the critical dependency here: zero-copy data federation allows agents in Org A to reason about customer data physically residing in Org B without duplicating or copying it. The intelligence moves to the data; the data stays where it lives.
AgentExchange is the discovery and governance layer for this ecosystem. Agentforce 3 introduced AgentExchange as the marketplace for AI agent applications, including over 30 partner-built connectors, actions, and MCP servers covering integrations with AWS, Google Cloud, IBM, and others. Third-party agents in AgentExchange are certified, governed, and connected via open standards. Before building a custom Apex integration to reach an external AI capability, check AgentExchange first, the MCP server may already be there, security and compliance controls included.
The Restaurant Analogy
I use this analogy constantly in stakeholder conversations because it lands at every level of technical familiarity, from service reps to CTOs.
The Superagent
The Front DoorThe Superagent, Salesforce’s Answer to the Maze vs. Monolith Problem
Salesforce’s Agentforce documentation names a specific architectural pattern I think the community is underestimating: the Superagent, also referred to as the Primary Agent. This is the solution to a trap that’s deceptively easy to fall into as your Agentforce deployment grows.
Without a Superagent, organizations end up building a maze. Isolated specialist bots that users have to navigate themselves: “Ask the Billing bot, then log into the HR portal, then contact the Support agent.” That’s not agentic enterprise. That’s automation with a worse user experience than a phone tree.
The Superagent solves this by acting as the single, intelligent entry point across every channel. It maintains the full conversation context, understands the user’s intent holistically, decomposes complex requests into sub-tasks, and delegates to appropriate specialist Agentforce agents. All transparently. The user engages in one continuous, coherent conversation. The Superagent handles all routing and orchestration invisibly.
What makes this governance model powerful is how it threads the organizational needle. Business teams can build and own their domain specialist agents, Service, Sales, HR, Finance, launching independently without waiting on central IT. Central IT maintains unified policy enforcement and visibility through the Superagent control layer. Domain ownership and centralized governance, simultaneously. After 15 years of watching these two forces fight each other in every Salesforce implementation I’ve run, seeing an architecture that structurally resolves the tension is significant.
Salesforce calls the mechanism that makes this seamless Floating Context, a shared session memory where the user’s identity, conversation history, and relevant variables travel with every handoff. No re-authentication. No “Can you confirm your account number again?” moments. The specialist agent already knows what it needs when the Superagent delegates the task.
The Technical Layer
Under the HoodAtlas, A2A, MCP, and What Each One Actually Does
I hear these used interchangeably in client conversations constantly. They’re complementary, not interchangeable, and the distinction matters architecturally.
MCP is the agent-to-tool layer. It governs how an Agentforce agent accesses external systems, APIs, and data sources: through MuleSoft MCP Servers, Heroku MCP Servers, or third-party MCP servers on AgentExchange. Think of it as how an agent uses its tools.
A2A is the agent-to-agent layer. It governs how Agentforce agents communicate and delegate to each other: a specialist in the same org (SOMA), a Salesforce agent in another org (MOMA), or a certified third-party agent from AgentExchange. Think of it as how agents coordinate as teammates.
In a mature Agentforce multi-agent implementation, you’ll use both. MCP gives agents reach beyond Salesforce. A2A gives agents the ability to collaborate and delegate within the trusted orchestration layer that Agentforce provides.
Design Patterns
Three PatternsFrom the Salesforce Architects Playbook, Applied in Practice
Manager-Worker Pattern
A Supervisor Agentforce agent decomposes a complex task and delegates to specialized worker agents, potentially in parallel. Atlas Reasoning routes each sub-task to the best-fit specialist agent. The Supervisor synthesizes results and manages the overall workflow without the user ever interacting directly with the workers.
Salesforce-native application: A sales intelligence pipeline where a Research Agent queries Data Cloud and external sources via MuleSoft MCP, a Qualification Agent enriches and scores leads, and an SDR Agent executes outreach, all orchestrated by a Supervisor without the sales rep navigating three separate tools.
→ Agentforce Use: Sales pipelines, parallel case resolution, multi-step Data Cloud workflowsJudge-Jury Pattern
A Judge Agentforce agent compiles a grounded prompt and passes it to two or more Juror agents. The Judge evaluates responses against accuracy, policy, or compliance standards. The Ensemble Approach is embedded directly in Agentforce and the Atlas Reasoning Engine; it’s the platform’s built-in mechanism for addressing response veracity. Salesforce’s own architecture documentation recommends using different underlying LLMs for Juror agents to eliminate shared model bias in the evaluation.
Salesforce-native application: Agentforce-generated customer communications at a regulated financial services company, where a Creator agent drafts responses and a Reviewer agent validates against compliance guardrails, before anything reaches the customer or the service rep for approval.
→ Agentforce Use: Regulated content, compliance validation, high-stakes grounded outputsOrchestrator Pattern (Collaborative Agent Swarm)
The Salesforce Architects team calls this the “agent swarm”: a collection of specialized Agentforce agents tackling a problem too complex for any single agent. An Orchestrator decomposes the large task, delegates sub-tasks to the appropriate specialists via A2A protocol, and synthesizes their outputs. Floating Context ensures every specialist has what it needs without the user repeating anything.
Salesforce-native application: A complex customer service issue involving Billing, Logistics, and Provisioning. A Billing Agent investigates payment discrepancies. A Logistics Agent checks shipment status in Commerce Cloud. A Provisioning Agent validates service entitlements. The Orchestrator synthesizes all three findings and surfaces them to a service rep in Service Cloud for final approval, with Enhanced Chat as the user entry point throughout.
→ Agentforce Use: Multi-cloud case resolution, cross-org customer journeys, end-to-end onboardingImplementation
The RoadmapHow I’d Actually Sequence This in a Real Agentforce Engagement
Audit Your Current Agent Scope: Be Ruthless
List every topic, instruction, and action your current Agentforce agent handles. If that list spans more than four or five distinct business domains, you have a monolith. Mark the natural task boundaries; these become your agent boundaries. A useful diagnostic: if the agent produces a wrong output and you can’t tell from the Atlas Reasoning trace which instruction caused it, the agent scope is too broad. That’s your decomposition signal.
Design Your Agentforce Ecosystem in Agent Builder Before You Build
Define your Supervisor agent’s routing logic. Define each specialist agent’s scope (topics, instructions, actions, guardrails) with the precision you’d give a single-purpose agent. Map which agents talk to which, and whether communication is native same-org routing (SOMA) or requires A2A across orgs (MOMA). Document exactly what Floating Context must survive each handoff. I spend at minimum two full working sessions on this design before anyone touches Agent Builder. The YAML-based agent definitions in Agentforce reward upfront clarity. Poorly scoped specialist agents are expensive to refactor after deployment.
Check AgentExchange Before Building Any Third-Party Integration
Before writing Apex or building a new MuleSoft flow to reach an external system or third-party AI capability, check AgentExchange. With Agentforce 3, the marketplace includes over 30 MCP servers and partner agent connectors covering major enterprise platforms, with Salesforce’s governance and compliance controls built in. The integration may already exist as a certified, installable MCP server. That eliminates custom code, accelerates deployment, and keeps your implementation fully within the Agentforce observability layer.
Instrument Agentforce Observability from Day One
The Agentforce Command Center exists because multi-agent flows are harder to trace and explain than monolithic agents, and the cost of a failure in production is higher when multiple agents are involved. Turn on observability from your first deployment. Trace Atlas routing decisions. Monitor specialist agent handoffs. Set security policy thresholds. This is not a post-launch concern; it’s the governance layer that makes multi-agent architecture trustworthy at enterprise scale. Without it, you’re flying blind in a system that’s more complex than anything you’ve run on Agentforce before.
Start SOMA: Move to MOMA Only When You Must
MOMA introduces real architectural complexity: distributed state, cross-org OAuth, A2A latency, and a dependency on Salesforce Data Cloud’s zero-copy federation as the unified data layer. Don’t choose it because the pattern exists. Choose it when legal, regulatory, or technical-debt boundaries make consolidating into a single Salesforce org genuinely impossible. In most cases, Salesforce Data Cloud’s federation capability resolves the data visibility problem that drives teams toward MOMA, without crossing the org boundary at all.
The Bigger PictureWhat This Demands of Us as Salesforce Architects
I want to close with something that isn’t in the Salesforce architecture documentation, because it’s what I actually sit with after a long implementation day.
For fifteen years, most of my work as a Salesforce architect was about connection: connecting systems, connecting processes, connecting data across org boundaries. The hard problems were integration problems. SOMA, MOMA, and 3P agent architecture changes the nature of the hard problem. It’s now about decomposition: deciding what each Agentforce agent should know, what it should act on, what it should defer, and what requires human judgment before anything executes.
That’s a genuinely different discipline. It borrows from system architecture, from organizational design, and from the kind of governance thinking that Salesforce has always pushed us toward, but with AI-specific wrinkles that none of our classic Salesforce certifications fully prepared us for. The architects who will thrive in the next five years are those who can hold data models, integration patterns, and agent cognition in their heads simultaneously, and make good decisions at the intersection of all three.
Build something narrow first. Get SOMA right before reaching for MOMA. Use AgentExchange before writing custom integration code. Turn on Observability on day one. And treat the Superagent layer as the governance architecture it is, not just the user-facing front door.
The platform is ready. The question is whether our architectural thinking has kept pace with it.
Drop a comment, especially if you’re navigating a SOMA-to-MOMA decision…