Use this file to discover all available pages before exploring further.
Governe provides comprehensive identity and access management (IAM) for your organization. This includes user management, role-based permissions, SSO configuration, and programmatic access through API keys and service accounts.
Member base + agent-factory:*, storage:*, knowledge:*
*
Full agent-factory & knowledge access
Builder
builder
Agent Maker + builder:*
*
Builder + agent-factory + knowledge access
Agent Standard
agent-standard
llm:*, tools:*
—
Default agent role (for service accounts)
All system roles except owner can be customized per organization. When an admin edits a system role in the Governe UI, a custom role override is saved for that organization that fully replaces the system definition.
Select permissions using the Permission Tree Editor
The role editor displays permissions as a hierarchical tree organized by product > resource > action:
Checking a product node sets the product-level wildcard (e.g. storage:*)
Checking a resource node sets the resource-level wildcard (e.g. storage:vector_stores:*)
Individual actions can be toggled independently
For products supporting instance scoping, a Scopes section appears under each resource, allowing admins to set the “All resources” wildcard or add specific resource IDs
When updating SSO config, the system validates that domains are not already claimed by another organization. If a domain conflict is found, the update is rejected with a DOMAIN_ALREADY_USED error.
SSO provider secrets (OIDC clientSecret, SAML certificates) are encrypted at rest using envelope encryption (@prisme.ai/secrets) when the SECRETS_MASTER_KEYS environment variable is configured:
A per-organization Data Encryption Key (DEK) encrypts the SSO config
The DEK is wrapped by a platform-level Key Encryption Key (KEK) using AES-256-GCM
Wrapped DEKs are stored in MongoDB alongside the org; plaintext secrets are never persisted
If SECRETS_MASTER_KEYS is not configured, SSO configs are stored in plaintext.
Join rules allow automatic organization membership based on user attributes. Rules are evaluated dynamically and can assign both a role and group memberships.
Join rules are evaluated on every /me API call (the first call the platform makes after authentication). A per-user version cache ensures rules are only re-evaluated when they change:
Each org’s join rules have a version counter (incremented when rules are updated)
The gateway tracks which version was last evaluated for each user
If the version matches, evaluation is skipped for that org
API keys (iak_*) enable programmatic access to the Prisme.ai platform from external systems. They are scoped to an organization and carry specific permissions and resource scopes.
The embedded orgSlug allows the auth middleware to resolve the organization without a database lookup. Keys are stored hashed — the plaintext key is returned only once at creation time.
Scopes restrict which resources a key can access, even if the permission allows the action. They use the same product:resource:id format as role scopes:
API key validation is handled natively by the platform runtime. When a request includes an iak_* key, the runtime resolves the organization, permissions, and scopes, then injects them into the standard run.permissions and run.scopes variables — the same variables used for user session auth. No cross-workspace HTTP call is needed.