Create a new agent enforcement policy with conditional rules for runtime access control
POST /v1/maip/policies
Creates a new MAIP agent enforcement policy for the authenticated tenant. Policies define runtime rules that are evaluated when agents request access to scoped resources via the Evaluate Policy endpoint.
X-API-Key header or Bearer JWT token. Tenant-scoped via cookie or JWT claim.
"scope" — Restricts access based on scopes or resources"trust" — Restricts access based on trust scores"rate" — Restricts access frequency or volume"custom" — Custom enforcement logic"custom" if omitted.100 if omitted. Multiple policies at the same priority are
evaluated in creation order."effect": "deny" matches, the action is denied.Rule schema:| Field | Type | Operators | Description |
|---|---|---|---|
trust_score | number | lt, gt, le, ge | Agent’s current trust score (0.0-1.0) |
scope | string | eq, ne, in, contains | The scope being accessed (e.g., "data:write") |
agent_type | string | eq, ne, in | Agent type (e.g., "llm", "worker", "orchestrator") |
delegation_depth | number | gt, ge, lt, le | Agent’s position in the delegation chain (0 = direct) |
| Operator | Description | Example value |
|---|---|---|
eq | Equals | "data:write" |
ne | Not equals | "system" |
lt | Less than | 0.5 |
gt | Greater than | 3 |
le | Less than or equal | 0.3 |
ge | Greater than or equal | 0.7 |
in | Matches any value in a list | ["llm", "worker"] |
contains | String contains substring | "write" |
"allow" — Explicitly allow (does not override denials)"deny" — Block the action. First deny wins."require_approval" — Require human approval before proceedingid, tenant_id, status, timestamps).
"active" on creation.API key for machine-to-machine authentication
Human-readable policy name
256Array of policy rules
Detailed description of the policy
2048Policy category
scope, trust, rate, custom Evaluation priority (lower = first)
1 <= x <= 1000Policy created
UUID primary key
UUID of the owning tenant
Human-readable policy name
Detailed policy description
Policy category
scope, trust, rate, custom Policy lifecycle status
active, disabled, archived Evaluation priority (lower = first)
Array of policy rules