Agentforce SOMA, MOMA, and 3P Deep Dive

From Monoliths to Maestros | Salesforce Agentforce Multi-Agent Architecture
Salesforce Agentforce · Multi-Agent Architecture

From Monoliths to Maestros:
What SOMA, MOMA, and 3P Agents Mean for How We Build on Agentforce

SP
Sandip Patel
Certified Salesfore Architect

Last quarter, I observed a flagship Agentforce deployment at a large financial services firm. The entire setup relied on a single agent powered by one extensive system prompt, expected to manage account queries, product questions, onboarding FAQs, and escalations all at once. The initial demo was flawless. However, about six weeks after going live, issues began to appear. The agent started blending account-specific logic with generic product responses. By that point, the system prompt had expanded beyond 8,000 tokens, and no one could pinpoint which instruction was triggering the incorrect outputs. It was a clear example of how quickly complexity can become difficult to control when everything is consolidated into one prompt.

This is the monolith trap, and it’s more common than anyone in the Agentforce community wants to admit. The Salesforce Architects team has published a clear, opinionated response to this problem: SOMA, MOMA, and a third-party (3P) agent integration model that collectively redefine what enterprise-scale Agentforce architecture actually looks like. I want to break it down with the architectural judgment this framework deserves.

Agentforce wasn’t designed to be a smarter single chatbot. The Atlas Reasoning Engine and multi-agent orchestration were built in from day one. Most of us just haven’t caught up to what the platform was always meant to become.

The Real ProblemWhy the Monolithic Agentforce Agent Has a Ceiling

Monolithic Agentforce agents are the starting point, not the destination. For narrow, well-scoped use cases, a knowledge retrieval bot, a “summarize this Case” button on a page layout, a single agent is exactly right. But as enterprise complexity enters the picture, two problems emerge that no amount of prompt refinement can fix.

The first is attention dilution. When a single Agentforce agent carries topics, instructions, and actions spanning support, sales, billing, compliance, and technical troubleshooting simultaneously, reasoning quality degrades. The agent holds a lot of context, but reasons about it less precisely. Atlas Reasoning is powerful, but it’s not immune to the limits of what a single agent can reliably handle.

The second is maintainability collapse. When something goes wrong in production, and it will, you’re digging through one enormous system prompt to find the failure. No fault isolation. No modularity. No ability to test one domain without touching the entire agent.

This is exactly why Salesforce frames multi-agent architecture as enabling greater scale, control, and flexibility than monolithic systems. Individual Agentforce agents can be added, replaced, modified, and tested independently. When one component fails, it doesn’t compromise the entire system. That’s not a product claim, it’s a structural property of the architecture, and it matters enormously once you’re in production.


The Three Architectures

Core PatternsSingle Agent, SOMA, MOMA, and Exactly When to Apply Each

Pattern 01 · The Foundation
Single Agentforce Agent, The Monolith
Start Here Only
One Agentforce agent. One system prompt covering a defined scope. Topics, instructions, actions, and guardrails all live in one place. The user sends a message, Atlas Reasoning retrieves context from Data Cloud or Salesforce records, and the agent generates a response. This is the “General Contractor” model: one agent responsible for everything. It’s fast to build, easy to demo, and works well for genuinely narrow use cases. The problems begin when you add the fourth domain, the sixth topic, the tenth instruction. Debugging becomes archaeology. Accuracy drifts. Prompt engineering stops compensating for the underlying structural problem.
Architect’s Verdict: Right for micro-utilities and tightly scoped, single-domain deployments. The wrong foundation for anything requiring high accuracy across varied intents or multiple business domains.
Pattern 02 · SOMA
Single Org, Multiple Agentforce Agents, The Specialized Team
Your Default Pattern
Multiple specialized Agentforce agents collaborating inside one Salesforce org, under shared governance and data. A Supervisor agent acts as the single front door, the user always talks to one agent. Behind the scenes, Atlas Reasoning Engine reviews each specialist agent’s description, instructions, and available actions, then intelligently routes the task to the right specialist. The user never loses context, never switches interfaces, never repeats themselves.

Because everything runs inside the same Salesforce org, specialists share native access to the same Case record, the same Contact, the same Data Cloud context, without complex API calls or separate authentication flows. This shared governance is the real architectural advantage over what comes next.

A concrete example from the Salesforce Architects documentation: a healthcare Member Services solution using SOMA. An Answerbot handles anonymous users. An Orchestrator manages authenticated members. Dedicated Domain SME agents cover Case management, Claims, and Benefits. Each agent is focused, independently testable, and replaceable without touching any other component.
Architect’s Verdict: This is your default for most Agentforce implementations, Service Cloud, Sales Cloud, Employee Experience. The balance of performance, governance, and manageability is right. Start here before considering anything more complex.
Pattern 03 · MOMA
Multi Org, Multiple Agentforce Agents, The Enterprise Conglomerate
When Boundaries Force It
Agentforce agents collaborating across multiple Salesforce orgs, the M&A scenario, the North America / EMEA split, the org-per-business-unit estate nobody planned but everyone inherited. A Supervisor agent in Org A delegates a task to an agent in Org B via the standardized Agent-to-Agent (A2A) protocol. This Salesforce-native handshake ensures org-level trust, user identity flow, and shared conversation context survive the org boundary.

What MOMA introduces architecturally: distributed state management, cross-org OAuth flows, and real latency. These aren’t reasons to avoid it; they’re engineering realities you need to plan for. Salesforce Data Cloud becomes the critical dependency here: zero-copy data federation allows agents in Org A to reason about customer data physically residing in Org B without duplicating or copying it. The intelligence moves to the data; the data stays where it lives.
Architect’s Verdict: Necessary for global enterprises with genuinely fragmented Salesforce estates. Don’t choose MOMA because it’s architecturally impressive. Choose it when legal, regulatory, or organizational boundaries make consolidating into a single org genuinely impossible, and not before.
Pattern 04 · 3P Integration
Third-Party Agents in the Agentforce Ecosystem
The Open Ecosystem
Agentforce is not a walled garden. With native A2A support in Agentforce 3, a primary Agentforce Supervisor agent can securely delegate tasks to certified third-party agents, agents built outside Salesforce, as part of a unified orchestration flow. The user sees one seamless experience; Agentforce handles cross-agent coordination under its own identity, policy, and observability layer.

AgentExchange is the discovery and governance layer for this ecosystem. Agentforce 3 introduced AgentExchange as the marketplace for AI agent applications, including over 30 partner-built connectors, actions, and MCP servers covering integrations with AWS, Google Cloud, IBM, and others. Third-party agents in AgentExchange are certified, governed, and connected via open standards. Before building a custom Apex integration to reach an external AI capability, check AgentExchange first, the MCP server may already be there, security and compliance controls included.
Architect’s Verdict: Extend your Agentforce implementation into the broader enterprise ecosystem without abandoning Salesforce’s governance model. The combination of A2A for agent-to-agent coordination and AgentExchange for certified, governed 3P connectivity is how Agentforce becomes the connective tissue for your entire AI estate.
Diagram 02 · SOMA vs MOMA: Structural Comparison
SOMA: SINGLE ORG Shared governance · Native data access · Low latency USER one channel SUPERVISOR Atlas Routing Floating Context Sales Agent CRM · Opp data Service Agent Cases · SLAs Finance Agent Billing · ERP Salesforce Data Cloud Unified customer data · Shared org · Native permissions ✓ Default pattern for most Agentforce implementations ORG A Sales Portal USER request Super agent Org A Sales Specialist Agent Handles Org A data natively A2A Protocol OAuth · Trust · Context ORG B ERP / Warehouse Inventory Agent Org B data Salesforce Data Cloud: Zero-Copy Federation Data stays in each org · Intelligence moves · Unified customer view ⚠ Use only when legal / org boundaries prevent SOMA
Fig 2. SOMA (left): multiple agents, one org, shared data natively. MOMA (right): agents span org boundaries via A2A protocol, unified by Data Cloud federation.

The Restaurant Analogy

I use this analogy constantly in stakeholder conversations because it lands at every level of technical familiarity, from service reps to CTOs.

🚚
Single Agentforce Agent
The Food Truck
One person takes the order, cooks, pours drinks, and processes payment. Heroic for one customer. When ten people queue simultaneously, mistakes multiply and quality drops.
🍽️
SOMA
The Restaurant
A Host (Supervisor) greets every guest. A Waiter takes the order. A Chef cooks. All in one building (org), sharing the same kitchen infrastructure. Coordination is fast, governance is unified and the guest always has one point of contact.
🌐
MOMA
The Multi-Location Chain
Three restaurants, three cities, one brand. Each kitchen runs independently (separate orgs), but a central reservation network (A2A + Data Cloud) connects them. Powerful for a distributed estate, but the coordination chain has more failure points.

The Superagent

The Front DoorThe Superagent, Salesforce’s Answer to the Maze vs. Monolith Problem

Salesforce’s Agentforce documentation names a specific architectural pattern I think the community is underestimating: the Superagent, also referred to as the Primary Agent. This is the solution to a trap that’s deceptively easy to fall into as your Agentforce deployment grows.

Without a Superagent, organizations end up building a maze. Isolated specialist bots that users have to navigate themselves: “Ask the Billing bot, then log into the HR portal, then contact the Support agent.” That’s not agentic enterprise. That’s automation with a worse user experience than a phone tree.

The Superagent solves this by acting as the single, intelligent entry point across every channel. It maintains the full conversation context, understands the user’s intent holistically, decomposes complex requests into sub-tasks, and delegates to appropriate specialist Agentforce agents. All transparently. The user engages in one continuous, coherent conversation. The Superagent handles all routing and orchestration invisibly.

What makes this governance model powerful is how it threads the organizational needle. Business teams can build and own their domain specialist agents, Service, Sales, HR, Finance, launching independently without waiting on central IT. Central IT maintains unified policy enforcement and visibility through the Superagent control layer. Domain ownership and centralized governance, simultaneously. After 15 years of watching these two forces fight each other in every Salesforce implementation I’ve run, seeing an architecture that structurally resolves the tension is significant.

Salesforce calls the mechanism that makes this seamless Floating Context, a shared session memory where the user’s identity, conversation history, and relevant variables travel with every handoff. No re-authentication. No “Can you confirm your account number again?” moments. The specialist agent already knows what it needs when the Superagent delegates the task.

Diagram 03 · Superagent Architecture: Floating Context Flow
FLOATING CONTEXT: User Identity · Conversation History · Session Variables (travels with every handoff) USER “Change my major + aid?” SUPERAGENT Atlas Reasoning Decomposes intent Routes to specialists Academic Records Agent Pulls transcripts Checks prerequisites Financial Aid Agent Recalculates eligibility Applies policy rules Advisor Agent Finds available slots Schedules meeting SYNTHESIZER Combines results Unified response No context lost UNIFIED RESPONSE One answer The user never knew three agents were involved. The Superagent handled all orchestration transparently.
Fig 3. The Superagent receives intent, decomposes into specialist tasks, maintains Floating Context across all handoffs, and returns one coherent response. The user sees a single conversation throughout.

The Technical Layer

Under the HoodAtlas, A2A, MCP, and What Each One Actually Does

Core Reasoning
Atlas Reasoning Engine
The cognitive core of every Agentforce multi-agent flow. Atlas reviews each specialist agent’s description, instructions, and available actions to determine which is best equipped for the current task, and routes intelligently. It creates dynamic reasoning paths that adapt based on agent capability and task requirements, not static keyword routing. In Agentforce 3, the enhanced Atlas architecture delivered 50% lower latency with improved resiliency. Atlas is what makes the Superagent pattern function at enterprise scale rather than becoming a coordination bottleneck.
Agent Communication
Agent-to-Agent (A2A) Protocol
The standardized, open protocol for direct agent-to-agent communication, both within a single Salesforce org (SOMA routing) and across multiple Salesforce orgs (MOMA cross-org delegation). In MOMA, A2A handles the cross-org handshake: org-level trust, OAuth identity flow, and shared conversation context crossing the org boundary. A2A gives agents a digital identity and a structured collaboration framework: they can decompose tasks, delegate responsibilities, and function as genuine teammates rather than isolated systems. Salesforce was one of the earliest platform backers of the A2A standard.
External Connectivity
Model Context Protocol (MCP)
MCP is how Agentforce reaches systems outside the Salesforce platform. Agentforce functions as an MCP client, connecting to: MuleSoft MCP Servers for standard enterprise API integration, Heroku MCP Servers for custom logic and external data sources, and third-party MCP Servers surfaced through AgentExchange. Agentforce 3 introduced native MCP client support, meaning agents can connect to any MCP-compliant server without custom integration code. Salesforce’s security model, permissions, and audit trail are inherited automatically. Data stays where it lives; agents access it through a governed, traceable connection layer.
Production Visibility
Agentforce Observability & Command Center
Introduced in Agentforce 3 specifically because multi-agent flows are harder to trace than monolithic agents, and harder to explain to stakeholders when something fails. The Command Center provides full visibility into what agents are doing across a multi-agent system: interaction traces, routing decisions, security policy enforcement, and the ability to intervene when an agent goes off-track. This is not a monitoring add-on. It’s the governance infrastructure that makes the architecture trustworthy at enterprise scale and the tool that separates a production-grade Agentforce deployment from a demo that degrades under real-world load.
Diagram 04 · A2A Protocol vs Model Context Protocol (MCP): Distinct Roles
A2A: AGENT TO AGENT How agents coordinate as teammates Supervisor Agentforce Org A A2A Specialist Agentforce Same / Other Org 3P Agent AgentExchange Certified partner A2A Handles → Org-level trust and identity handoff → Shared conversation context (MOMA) → Agent-to-agent task delegation (SOMA + 3P) MCP: MODEL CONTEXT PROTOCOL How agents reach external tools and systems Agentforce MCP Client Any specialist agent MuleSoft MCP Server Enterprise APIs Heroku MCP Server Custom logic AgentExchange 3P MCP Servers AWS / IBM / Google EXTERNAL SYSTEMS SAP · ERP Databases Data lakes APIs AI services 3rd party
Fig 4. A2A (left) governs how agents delegate and coordinate with each other. MCP (right) governs how agents reach external tools and systems. Both are needed in a mature Agentforce multi-agent deployment.
The Distinction That Always Gets Conflated: A2A vs. MCP

I hear these used interchangeably in client conversations constantly. They’re complementary, not interchangeable, and the distinction matters architecturally.

MCP is the agent-to-tool layer. It governs how an Agentforce agent accesses external systems, APIs, and data sources: through MuleSoft MCP Servers, Heroku MCP Servers, or third-party MCP servers on AgentExchange. Think of it as how an agent uses its tools.

A2A is the agent-to-agent layer. It governs how Agentforce agents communicate and delegate to each other: a specialist in the same org (SOMA), a Salesforce agent in another org (MOMA), or a certified third-party agent from AgentExchange. Think of it as how agents coordinate as teammates.

In a mature Agentforce multi-agent implementation, you’ll use both. MCP gives agents reach beyond Salesforce. A2A gives agents the ability to collaborate and delegate within the trusted orchestration layer that Agentforce provides.


Design Patterns

Three PatternsFrom the Salesforce Architects Playbook, Applied in Practice

1

Manager-Worker Pattern

A Supervisor Agentforce agent decomposes a complex task and delegates to specialized worker agents, potentially in parallel. Atlas Reasoning routes each sub-task to the best-fit specialist agent. The Supervisor synthesizes results and manages the overall workflow without the user ever interacting directly with the workers.

Salesforce-native application: A sales intelligence pipeline where a Research Agent queries Data Cloud and external sources via MuleSoft MCP, a Qualification Agent enriches and scores leads, and an SDR Agent executes outreach, all orchestrated by a Supervisor without the sales rep navigating three separate tools.

→ Agentforce Use: Sales pipelines, parallel case resolution, multi-step Data Cloud workflows
2

Judge-Jury Pattern

A Judge Agentforce agent compiles a grounded prompt and passes it to two or more Juror agents. The Judge evaluates responses against accuracy, policy, or compliance standards. The Ensemble Approach is embedded directly in Agentforce and the Atlas Reasoning Engine; it’s the platform’s built-in mechanism for addressing response veracity. Salesforce’s own architecture documentation recommends using different underlying LLMs for Juror agents to eliminate shared model bias in the evaluation.

Salesforce-native application: Agentforce-generated customer communications at a regulated financial services company, where a Creator agent drafts responses and a Reviewer agent validates against compliance guardrails, before anything reaches the customer or the service rep for approval.

→ Agentforce Use: Regulated content, compliance validation, high-stakes grounded outputs
3

Orchestrator Pattern (Collaborative Agent Swarm)

The Salesforce Architects team calls this the “agent swarm”: a collection of specialized Agentforce agents tackling a problem too complex for any single agent. An Orchestrator decomposes the large task, delegates sub-tasks to the appropriate specialists via A2A protocol, and synthesizes their outputs. Floating Context ensures every specialist has what it needs without the user repeating anything.

Salesforce-native application: A complex customer service issue involving Billing, Logistics, and Provisioning. A Billing Agent investigates payment discrepancies. A Logistics Agent checks shipment status in Commerce Cloud. A Provisioning Agent validates service entitlements. The Orchestrator synthesizes all three findings and surfaces them to a service rep in Service Cloud for final approval, with Enhanced Chat as the user entry point throughout.

→ Agentforce Use: Multi-cloud case resolution, cross-org customer journeys, end-to-end onboarding
Diagram 05 · Three Agentforce Collaboration Patterns at a Glance
01 · MANAGER-WORKER Parallel delegation SUPERVISOR Decomposes task Atlas Routing Worker A Research Agent Worker B Qualify Agent Worker C Outreach Agent SYNTHESISED RESULT Parallel → Unified response Sales pipelines · DevOps automation 02 · JUDGE & JURY Ensemble evaluation JUDGE AGENT Grounded prompt Compiles context Juror A Creator Agent (LLM Model 1) Drafts response Juror B Reviewer Agent (LLM Model 2) Validates accuracy VERDICT Bias-free · Policy-validated Compliance · Regulated communications 03 · ORCHESTRATOR SWARM Sequential with Floating Context ORCHESTRATOR Sequences sub-tasks A2A protocol Billing Agent Investigates discrepancy Logistics Agent Checks Commerce Cloud Provisioning Agent Validates entitlements FLOAT ING CTX travels with every step Cross-cloud journeys · Complex case resolution
Fig 5. Three Agentforce collaboration patterns. Manager-Worker: parallel delegation and synthesis. Judge & Jury: multi-model ensemble evaluation for accuracy and compliance. Orchestrator Swarm: sequential specialist delegation with Floating Context throughout.

Implementation

The RoadmapHow I’d Actually Sequence This in a Real Agentforce Engagement

01

Audit Your Current Agent Scope: Be Ruthless

List every topic, instruction, and action your current Agentforce agent handles. If that list spans more than four or five distinct business domains, you have a monolith. Mark the natural task boundaries; these become your agent boundaries. A useful diagnostic: if the agent produces a wrong output and you can’t tell from the Atlas Reasoning trace which instruction caused it, the agent scope is too broad. That’s your decomposition signal.

02

Design Your Agentforce Ecosystem in Agent Builder Before You Build

Define your Supervisor agent’s routing logic. Define each specialist agent’s scope (topics, instructions, actions, guardrails) with the precision you’d give a single-purpose agent. Map which agents talk to which, and whether communication is native same-org routing (SOMA) or requires A2A across orgs (MOMA). Document exactly what Floating Context must survive each handoff. I spend at minimum two full working sessions on this design before anyone touches Agent Builder. The YAML-based agent definitions in Agentforce reward upfront clarity. Poorly scoped specialist agents are expensive to refactor after deployment.

03

Check AgentExchange Before Building Any Third-Party Integration

Before writing Apex or building a new MuleSoft flow to reach an external system or third-party AI capability, check AgentExchange. With Agentforce 3, the marketplace includes over 30 MCP servers and partner agent connectors covering major enterprise platforms, with Salesforce’s governance and compliance controls built in. The integration may already exist as a certified, installable MCP server. That eliminates custom code, accelerates deployment, and keeps your implementation fully within the Agentforce observability layer.

04

Instrument Agentforce Observability from Day One

The Agentforce Command Center exists because multi-agent flows are harder to trace and explain than monolithic agents, and the cost of a failure in production is higher when multiple agents are involved. Turn on observability from your first deployment. Trace Atlas routing decisions. Monitor specialist agent handoffs. Set security policy thresholds. This is not a post-launch concern; it’s the governance layer that makes multi-agent architecture trustworthy at enterprise scale. Without it, you’re flying blind in a system that’s more complex than anything you’ve run on Agentforce before.

05

Start SOMA: Move to MOMA Only When You Must

MOMA introduces real architectural complexity: distributed state, cross-org OAuth, A2A latency, and a dependency on Salesforce Data Cloud’s zero-copy federation as the unified data layer. Don’t choose it because the pattern exists. Choose it when legal, regulatory, or technical-debt boundaries make consolidating into a single Salesforce org genuinely impossible. In most cases, Salesforce Data Cloud’s federation capability resolves the data visibility problem that drives teams toward MOMA, without crossing the org boundary at all.

The Bigger PictureWhat This Demands of Us as Salesforce Architects

I want to close with something that isn’t in the Salesforce architecture documentation, because it’s what I actually sit with after a long implementation day.

For fifteen years, most of my work as a Salesforce architect was about connection: connecting systems, connecting processes, connecting data across org boundaries. The hard problems were integration problems. SOMA, MOMA, and 3P agent architecture changes the nature of the hard problem. It’s now about decomposition: deciding what each Agentforce agent should know, what it should act on, what it should defer, and what requires human judgment before anything executes.

That’s a genuinely different discipline. It borrows from system architecture, from organizational design, and from the kind of governance thinking that Salesforce has always pushed us toward, but with AI-specific wrinkles that none of our classic Salesforce certifications fully prepared us for. The architects who will thrive in the next five years are those who can hold data models, integration patterns, and agent cognition in their heads simultaneously, and make good decisions at the intersection of all three.

The Agentforce frameworks are published. The protocols are open. The marketplace is live. The observability layer is built. What’s still a human job, and always will be, is the judgment to apply them well.

Build something narrow first. Get SOMA right before reaching for MOMA. Use AgentExchange before writing custom integration code. Turn on Observability on day one. And treat the Superagent layer as the governance architecture it is, not just the user-facing front door.

The platform is ready. The question is whether our architectural thinking has kept pace with it.

#Agentforce #Salesforce #SOMA #MOMA #AtlasReasoningEngine #AgentExchange #A2AProtocol #ModelContextProtocol #SalesforceArchitect #AgentforceArchitecture #MultiAgentAI #EnterpriseAI #Agentforce3
Working through a real Agentforce multi-agent decision right now?

Drop a comment, especially if you’re navigating a SOMA-to-MOMA decision…

Leave a reply

Your email address will not be published. Required fields are marked *