Policy and Access Control Guide

How to combine LLM policies with role-based ACLs so users only access compliant and authorized information.

Guide Highlights

  • Enable multiple LLM policies to apply block and redact rules together.
  • Map ingestion paths to roles using connector role rules.
  • Ensure users have matching Keycloak workspace roles.
  • Validate retrieval behavior using source visibility and audit logs.
  • Use admin filtering by user/date/role for governance checks.