Enforce compliance rules, trust requirements, and security policies across your ecosystem. Policies apply to three categories:Documentation Index
Fetch the complete documentation index at: https://docs.truthlocks.com/llms.txt
Use this file to discover all available pages before exploring further.
MINT, VERIFY, and BUNDLE_EXPORT.
Looking to set up rule-based policies from the console or API? See the issuance policies guide for creating, managing, and simulating policies without writing code.
Policy Templates
B2C - Consumer
Consumer-focused policy with trust disclosure and risk protections. - Issuer
must be in trusted status - Trust tier must be verified_org or higher -
Block high/critical risk issuers - Key must be active
B2B - Enterprise
Business-to-business with industry requirements and key rotation. - Issuer
must be in trusted status - Finance/Healthcare require regulated_issuer tier
- Key rotation required every 180 days - Governance approvals for status changes
B2G - Government
Government-grade policy with strict compliance requirements. - All
attestations require regulated_issuer tier - Block medium or higher risk
issuers - Key rotation required every 90 days - Mandatory documented
revocation reasons
B2B2C - Hybrid
Hybrid policy for enterprise-to-consumer scenarios with dual disclosure. -
Issuer must be in trusted status - Trust tier must be verified_org or higher
- Privacy protection: payload not stored - Consumer-friendly + enterprise audit details
Usage
Policy Result
Policy Versioning
Each policy instance has a unique hash computed from the template and rules. This hash can be stored with attestations for audit purposes.Policy categories
| Category | Applies to |
|---|---|
MINT | Attestation minting requests |
VERIFY | Verification requests |
BUNDLE_EXPORT | Proof-bundle export and data-portability requests |
BUNDLE_EXPORT policies are evaluated whenever a user or API client requests a proof bundle download or submits a data-portability export. Use them to restrict exports by jurisdiction, trust tier, risk rating, or any other field available in the evaluation context. See export control policies for examples.
Policy lifecycle
Every policy has a status that controls enforcement:| Status | Behavior |
|---|---|
DRAFT | Saved but not enforced — use while iterating on rules |
ACTIVE | Enforced on every matching request |
DISABLED | Temporarily turned off without deleting |
ACTIVE policies are evaluated at request time. Each status change increments the policy version, which is recorded alongside every evaluation decision for auditability.
A typical lifecycle:
- Create as
DRAFT— build and refine rules without affecting live traffic. - Simulate — test the policy against sample inputs.
- Set to
ACTIVE— enforcement begins immediately. - Set to
DISABLED— pause enforcement without losing the policy definition. - Delete — remove the policy when no longer needed.
See the issuance policies guide for step-by-step instructions on managing policy status transitions.

