Policy Actions
Tollgate uses a policy-based access control model. Each tool call is evaluated against policies to determine the appropriate action.Actions
| Action | Behavior | Use Case |
|---|---|---|
allow | Proceed without approval | Trusted, read-only operations |
deny | Block entirely | Dangerous or disallowed operations |
prompt | Ask user for approval | Operations requiring human review |
allow
The tool call proceeds immediately without user interaction.- Read-only operations
- Well-understood, safe tools
- High-frequency operations where prompts would be disruptive
deny
The tool call is blocked and an error is returned to the AI agent.- Destructive operations like DELETE, DROP, TRUNCATE
- Administrative commands
- Operations outside the agent’s scope
prompt
The user is asked to approve or reject the tool call in the terminal.- Write operations
- Sensitive data access
- Any operation where human judgment is valuable
Policy Matching
Policies are matched using glob patterns:Match Priority
Policies are evaluated in order. The first matching policy wins:Smart Policies with Analyzers
For content-aware decisions, use analyzers:Session-Based Approvals
Reduce approval fatigue with session grants:Example Configurations
Strict (Maximum Security)
Balanced (Recommended)
Permissive (Development Only)
[!CAUTION] Permissive policies should only be used in development environments with non-sensitive data.