SimplaixSimplaix Gateway
Reference

Provider Access

ACL and tool-policy rule management for user/agent access to tool providers.

Endpoint Map

MethodPathAuthPurpose
GET/api/v1/admin/provider-accessJWT + provider:readList rules (with filters)
GET/api/v1/admin/provider-access/by-provider/:providerIdJWT + provider:readGrouped rules by pattern
GET/api/v1/admin/provider-access/:idJWT + provider:readGet one rule
POST/api/v1/admin/provider-accessJWT + provider:updateCreate rule
PUT/api/v1/admin/provider-access/:idJWT + provider:updateUpdate rule
DELETE/api/v1/admin/provider-access/:idJWT + provider:updateDelete rule
POST/api/v1/admin/provider-access/evaluateJWT + provider:updateDry-run tool policy evaluation
GET/api/v1/admin/provider-access/agent/:agentIdJWT + provider:updateList agent rules
PUT/api/v1/admin/provider-access/agent/:agentIdJWT + provider:updateReplace all agent rules atomically

Rule Schema

{
  "subjectType": "agent",
  "subjectId": "agt_...",
  "providerId": "provider_...",
  "action": "allow",
  "toolPattern": "slack_read_*",
  "riskLevel": "low",
  "description": "Read-only Slack"
}
  • subjectType: user or agent
  • action: allow deny require_confirmation
  • riskLevel: low medium high critical
  • confirmationMode: optional always or never

Dry-run Evaluate

POST /api/v1/admin/provider-access/evaluate
Authorization: Bearer <jwt>
Content-Type: application/json

{
  "userId": "usr_...",
  "providerId": "slack-provider-id",
  "toolName": "slack_send_message",
  "agentId": "agt_..."
}
{
  "action": "require_confirmation",
  "risk": "high",
  "matchedRule": {
    "id": "..."
  }
}

On this page