Platform capability

Controls who sees what. To the field level

Access decisions in classical software stop at the record. In AI, they have to go further: a retrieved chunk, a cached embedding, a summary by another user. Each can leak if you treat "the AI" as a single actor. The Platform treats every read as a scoped access event.

Access model

Every read is scoped

The Platform never asks "can this user see records". It asks "can this user see this field, this chunk, this summary, in this Space, right now".

User + agent request
L1

Identity scope

who

Resolved through SSO: role, department, clearance, Space membership.

L2

Row & field ACLs

data

Classical record-level controls. With AI-specific field visibility on top.

L3

Retrieval filter

retrieval

Retrieved chunks are filtered the same way as direct queries. No AI backdoor.

L4

Output inspection

output

Final response is re-checked. A model cannot leak something the user could never have read.

Only what they may see
Why this matters

The AI is not a superuser

No retrieval backdoors

The embedding index respects the same ACL as your CRM. A junior cannot retrieve what they can't query.

Granular, not generic

Same record, different visibility. A salary appears in HR's view and doesn't in IT's, automatically.

Break-glass with audit

When you need escalated access, the trail records who, when, why, and what they saw.

Access patterns

How teams scope by default

HR vs. manager view

Same employee record. Only HR sees comp, only the manager sees performance notes, and the agent mirrors the rule.

Client file segregation

Lawyers on matter A cannot retrieve summaries written by colleagues on matter B.

Finance data masking

Production finance data never returns unredacted to non-finance roles, even through an agent.

Anonymous research mode

Discovery queries on a dataset are allowed, but the agent returns stats. Never raw rows.

See per-field access working end-to-end.

Bring a scoped dataset. We'll run identical agent prompts from two roles and show you the different outputs. And the audit entries behind each.