Policy Rules
Policy rules let organization admins control tool usage across their team. Set up automatic blocks, approvals, or notifications based on tool actions and parameters.
Overview
Section titled “Overview”Policy rules evaluate every tool call against your defined conditions. When a rule matches:
| Action | Behavior |
|---|---|
| Block | Prevents the tool call from executing |
| Require Approval | Queues for admin approval before executing |
| Notify | Executes but sends alert to admins |
| Log Only | Executes with enhanced audit logging |
Creating a Policy Rule
Section titled “Creating a Policy Rule”-
Go to Admin → Policy Rules
Navigate to switchboard.fpdigital.ai/admin/policies
-
Click “Create Rule”
-
Define conditions
Select what triggers the rule (service, tool, parameters)
-
Set the action
Choose block, require approval, notify, or log only
-
Activate the rule
Condition Types
Section titled “Condition Types”Service-Level
Section titled “Service-Level”Apply to all tools within a service:
condition: service: quickbooksaction: require_approvalreason: "Financial data access requires approval"Tool-Level
Section titled “Tool-Level”Apply to specific tools:
condition: tool: gmail_sendaction: notifyreason: "External email sent"Parameter-Based
Section titled “Parameter-Based”Apply based on tool parameters:
condition: tool: slack_send_message parameters: channel_contains: "external"action: require_approvalreason: "Messages to external channels need approval"Example Policies
Section titled “Example Policies”Block Sensitive Financial Operations
Section titled “Block Sensitive Financial Operations”name: Block Financial Deletescondition: service: quickbooks tool_pattern: "*delete*"action: blockreason: "Deletion of financial records is not permitted"Require Approval for External Communication
Section titled “Require Approval for External Communication”name: External Email Approvalcondition: tool: gmail_send parameters: to_domain_not: "yourcompany.com"action: require_approvalreason: "External emails require manager approval"Notify on Large Data Exports
Section titled “Notify on Large Data Exports”name: Large Export Alertcondition: tool: drive_export parameters: result_count_gt: 100action: notifyreason: "Large data export detected"Rule Priority
Section titled “Rule Priority”Rules are evaluated in order of specificity:
- Exact tool match — Most specific
- Tool pattern match —
*delete*,*send* - Service-level — Applies to entire service
- Global — Applies to all tools
The first matching rule is applied. Place more specific rules before general ones.
Approval Workflow
Section titled “Approval Workflow”When a tool call requires approval:
- User initiates tool call
- Fp Switchboard queues the request
- Admin receives notification
- Admin reviews in dashboard
- Admin approves or denies
- User receives result (or denial notice)
Managing Rules
Section titled “Managing Rules”Viewing Active Rules
Section titled “Viewing Active Rules”Go to Admin → Policy Rules to see all rules with:
- Rule name and description
- Trigger count (how often it’s matched)
- Last triggered timestamp
- Status (active/paused)
Editing Rules
Section titled “Editing Rules”- Click on a rule
- Modify conditions or actions
- Save changes
Changes take effect immediately.
Pausing vs Deleting
Section titled “Pausing vs Deleting”- Pause — Temporarily disables the rule, keeps history
- Delete — Permanently removes the rule and its history
Audit Integration
Section titled “Audit Integration”All policy rule evaluations are logged:
{ "timestamp": "2024-01-15T10:30:00Z", "user": "user@company.com", "tool": "gmail_send", "rule_matched": "External Email Approval", "action_taken": "require_approval", "status": "pending"}View these logs in Admin → Audit Logs, filtered by “Policy Events”.
Best Practices
Section titled “Best Practices”- Start with notify — Observe patterns before blocking
- Document reasons — Clear explanations help users understand restrictions
- Review regularly — Adjust rules based on actual usage patterns
- Test rules — Use a test account to verify rules work as expected
- Layer rules — Combine general and specific rules for flexibility