Policy and Access Control Guide
How to combine LLM policies with role-based ACLs so users only access compliant and authorized information.
Guide Highlights
- Enable multiple LLM policies to apply block and redact rules together.
- Map ingestion paths to roles using connector role rules.
- Ensure users have matching Keycloak workspace roles.
- Validate retrieval behavior using source visibility and audit logs.
- Use admin filtering by user/date/role for governance checks.