Skip to content
Last updated

Delegated AI Governance


Overview

Tenant-Level Policies enable your B2B customers (tenants) to define and manage their own AI governance rules within boundaries you set as the platform owner. This delegation model ensures that each organization using your platform can tailor AI agent behavior to their specific compliance requirements, risk tolerance, and operational needs—without requiring your intervention.

The core principle

"One policy cannot rule them all."

Every organization has unique requirements. A financial services company needs strict transaction limits and audit trails. A startup values speed and flexibility. A healthcare provider must enforce HIPAA-compliant data handling. Tenant-Level Policies allow each customer to configure AI guardrails that match their reality—while you maintain overarching platform-level controls.

What this enables

For Platform Owners (You)For Your Customers (Tenants)
Set immutable platform boundariesDefine organization-specific rules
Maintain compliance baselineCustomize AI behavior for departments
Reduce support burdenSelf-service policy management
Scale governance across customersFaster time-to-value with AI

Why Tenant-Level Policies matter

The problem with centralized policies

Traditional centralized policy management creates significant challenges:

  1. One-Size-Fits-None: A policy that works for a 50-person startup is overly restrictive for an enterprise, while enterprise policies are too loose for regulated industries.

  2. Support Bottleneck: Every policy change request flows through your team, creating delays and scaling problems.

  3. Adoption Barriers: Customers won't adopt AI features if they can't align them with their internal governance requirements.

  4. Compliance Complexity: Different customers operate under different regulatory frameworks (SOX, HIPAA, GDPR, PCI-DSS). You can't anticipate every requirement.

The delegation solution

Tenant-Level Policies solve these problems through controlled delegation:

┌─────────────────────────────────────────────────────────────┐
│                   PLATFORM LEVEL                            │
│            (Set by You - Immutable Boundaries)              │
│                                                             │
│   • Maximum data access limits                              │
│   • Blocked actions (e.g., no bulk deletes)                 │
│   • Rate limiting ceilings                                  │
│   • Audit requirements                                      │
└─────────────────────────────────────────────────────────────┘

                            │ Inherits & Constrains

┌─────────────────────────────────────────────────────────────┐
│                   TENANT LEVEL                              │
│        (Set by Each Customer - Within Boundaries)           │
│                                                             │
│   Tenant A (Financial Services):                            │
│   • Transaction limit: $10,000                              │
│   • Require 2FA for all actions                             │
│   • Log all queries to SIEM                                 │
│                                                             │
│   Tenant B (Tech Startup):                                  │
│   • Transaction limit: $50,000                              │
│   • Auto-approve under $5,000                               │
│   • Standard logging only                                   │
│                                                             │
│   Tenant C (Healthcare):                                    │
│   • PHI masking on all responses                            │
│   • Approval required for patient data access               │
│   • HIPAA-compliant audit trail                             │
└─────────────────────────────────────────────────────────────┘

Key use cases

Use CaseScenarioTenant-Defined Policy ExampleValue
Financial ServicesBank needs different spending authorities per departmentTrading desk: require approval over $1M; Operations: block trades over $10KSelf-managed internal controls
Healthcare (HIPAA)Hospital needs compliant patient record accessAllow clinical staff to read records for treatment; block bulk PHI exportsCompliance team configures without platform updates
Multi-Department EnterpriseDifferent AI policies for Engineering, Sales, HREngineering: allow deploy tools; Sales: allow CRM only; HR: mask sensitive fieldsIT/Security manages access by department

Architecture: the delegation model

How it works

┌────────────────────────────────────────────────────────────────────┐
│                        YOUR PLATFORM                               │
│                                                                    │
│  ┌──────────────────────────────────────────────────────────────┐  │
│  │                  Frontegg AgentLink                          │  │
│  │                                                              │  │
│  │   Platform Policies          Tenant Policy Engine            │  │
│  │   ┌─────────────┐           ┌─────────────────────┐          │  │
│  │   │ • Max limits │          │ Tenant A Policies   │          │  │
│  │   │ • Blocked    │◄────────►│ Tenant B Policies   │          │  │
│  │   │   actions    │  Inherits│ Tenant C Policies   │          │  │
│  │   │ • Audit reqs │          │ ...                 │          │  │
│  │   └─────────────┘           └─────────────────────┘          │  │
│  │          │                           │                       │  │
│  │          └───────────┬───────────────┘                       │  │
│  │                      │                                       │  │
│  │                      ▼                                       │  │
│  │              Policy Evaluation                               │  │
│  │              (Platform → Tenant)                             │  │
│  │                      │                                       │  │
│  └──────────────────────┼───────────────────────────────────────┘  │
│                         │                                          │
│                         ▼                                          │
│                   AI Agent Request                                 │
│                   (Allow / Deny / Modify)                          │
└────────────────────────────────────────────────────────────────────┘

Policy evaluation order

  1. Platform Policy Check: Is this action allowed at the platform level?
  2. Tenant Policy Check: Does the tenant have specific rules for this action?
  3. Default Behavior: If no tenant policy exists, apply platform defaults.

Key architectural principles

PrincipleDescription
Platform SupremacyPlatform policies cannot be overridden by tenants
Tenant AutonomyWithin boundaries, tenants have full control
InheritanceTenant policies inherit platform constraints automatically
IsolationOne tenant's policies never affect another tenant
AuditabilityAll policy changes and evaluations are logged

Enabling Tenant-Level Policies

Follow these steps to enable your customers to define their own AI governance policies.

Navigate to the Frontegg AgentLink Portal to begin configuring tenant-level policy delegation.

Action: Log in to your Frontegg dashboard and select your application (e.g., "Expense Application") and environment (e.g., "Development").


Step 2: Navigate to Tools & Sources

Access the Tools & Sources section to manage MCP configuration sources that connect external data and services to your AI agents.

Action:

  1. Click on Tools & Sources in the top navigation menu
  2. Select the Sources tab
  3. Locate the Frontegg source in the sources list (Type: FRONTEGG)

The Sources page displays all available configuration sources. You'll see the Frontegg source listed with its connected tools and enable/disable toggle.

Tools & Sources - Sources Tab

Figure 2: The Tools & Sources page showing the Frontegg source in the Sources list


Step 3: Enable Policy Management Tools

Click into the Frontegg source to view and enable the specific tools you want to expose to your customers.

Action:

  1. Click on the Frontegg row in the Sources table
  2. View the Extracted tools panel on the right side
  3. Toggle ON the tools you want to make available to customers

The panel shows all available Frontegg tools (e.g., "0 of 20 enabled"). Each tool displays:

  • Tool name (e.g., ApprovalFlowsController_createApprovalFlow)
  • HTTP method (POST, DELETE, etc.)
  • API endpoint path
  • Enable/disable toggle

Policy-Related Tools to Enable:

ToolPurpose
Policy tools (get, create, update)Allow tenants to view and define their own policies
ApprovalFlowsController toolsEnable tenants to configure approval workflows

Frontegg Source - Extracted Tools

Figure 3: The Frontegg source detail page showing extracted tools with individual enable toggles

Tip: Start by enabling read-only tools (get_policies) before enabling write tools (create_policy, delete_policy).


Step 4: Customer Tool Discovery

Once you've enabled the policy management tools, your customers will see these new capabilities in their AI interface.

Important: After enabling new tools, customers may need to reconnect their AI assistant to discover the newly available tools.

What Customers Will See:

  • New tools appear in the AI interface tool list
  • Tools are labeled clearly (e.g., "Get Policies", "Define Policies")
  • Tool descriptions explain what each capability does

Customer Action Required:

  1. Customer opens their AI assistant (Claude, ChatGPT, etc.)
  2. If tools don't appear, customer reconnects to your platform's MCP server
  3. New policy management tools become available

Step 5: Customers Define Policies via Chat

With tools enabled, your customers can now define their organization's AI policies through natural conversation with their AI assistant.

Example Customer Interactions:

Customer: "Create a policy that requires approval for any 
          expense over $5,000"

AI:       "I'll create an approval policy for expenses. Here's 
          what I'll set up:
          
          Policy Name: High-Value Expense Approval
          Trigger: expense_submission where amount > 5000
          Action: require_approval
          Approvers: Manager role
          
          Should I create this policy?"

Customer: "Yes, and also add that anything over $25,000 needs 
          CFO approval"

AI:       "Done. I've created two policies:
          
          1. High-Value Expense Approval ($5K-$25K → Manager)
          2. Executive Expense Approval ($25K+ → CFO)
          
          Both are now active for your organization."

Key Benefits of Conversational Policy Definition:

  • No technical expertise required
  • Natural language understanding
  • Instant validation and feedback
  • Policy templates and suggestions

Step 6: View Customer-Specific Policies

All tenant-created policies are visible in the AgentLink UI, clearly marked as customer-specific.

What You'll See:

  • Policies organized by tenant/customer
  • Clear labeling: "Customer Defined" vs "Platform Default"
  • Policy details including conditions, actions, and audit status
  • Ability to view (but not modify) customer policies

Policy Visibility Matrix:

Policy TypePlatform Admin Can SeePlatform Admin Can EditTenant Admin Can SeeTenant Admin Can Edit
Platform PolicyYesYesNoNo
Tenant PolicyYesYesYesYes

Policy hierarchy and inheritance

Understanding how policies interact is critical for effective governance.

Hierarchy levels

Level 1: Platform Policies (Highest Priority)

    │    Cannot be overridden
    │    Example: "No bulk data exports allowed"


Level 2: Tenant Policies

    │    Can restrict further, cannot expand beyond platform limits
    │    Example: "Require approval for exports > 100 records"


Level 3: Default Behavior (Lowest Priority)
    
    Applied when no specific policy matches
    Example: "Allow read access to non-sensitive data"

Inheritance rules

RuleDescriptionExample
Restrictive InheritanceTenant policies can only be MORE restrictive than platform policiesPlatform allows up to $100K transactions; Tenant can limit to $50K, but not raise to $150K
Additive ConditionsTenants can add conditions to allowed actionsPlatform allows data access; Tenant adds "only during business hours"
No OverridePlatform-blocked actions cannot be enabled at tenant levelPlatform blocks "delete_all"; Tenant cannot create "allow delete_all"
Default Pass-ThroughIf no tenant policy exists, platform policy appliesPlatform allows read; No tenant policy = read allowed

Conflict resolution

When multiple policies could apply, AgentLink uses this resolution order:

  1. Explicit Deny always wins (at any level)
  2. Platform Policy takes precedence over Tenant Policy
  3. More Specific policy wins over general policy
  4. Most Restrictive policy wins when specificity is equal

Best practices

For platform owners

PracticeWhy It Matters
Define clear platform boundariesPrevents tenants from creating unsafe policies
Start with minimal tenant permissionsEasier to expand than restrict
Provide policy templatesHelps customers get started quickly
Document what tenants can/cannot doReduces support requests
Monitor tenant policy usageIdentify training opportunities

For tenant administrators

PracticeWhy It Matters
Start with read-only policiesTest understanding before creating restrictions
Use approval workflowsCatch mistakes before they impact users
Document policy rationaleFuture admins need context
Review policies quarterlyBusiness needs change
Test policies in staging firstPrevent production disruptions

Policy naming conventions

Use consistent, descriptive names:

✅ Good:
   - "Finance Team - Expense Approval Over 5K"
   - "HIPAA - PHI Access Logging Required"
   - "Engineering - Deploy Requires PR Approval"

❌ Bad:
   - "Policy 1"
   - "New rule"
   - "Test"

FAQ

General questions

Q: Can tenants see other tenants' policies?
A: No. Tenant policies are completely isolated. Each tenant only sees their own policies.

Q: What happens if a tenant deletes all their policies?
A: Platform default policies apply. The tenant's AI agents continue to function within platform-defined boundaries.

Q: Can tenants create policies that affect other tenants?
A: No. Tenant policies only affect their own organization's AI agents.

Technical questions

Q: How quickly do policy changes take effect?
A: Policy changes are typically active within 30 seconds of creation.

Q: Is there a limit to how many policies a tenant can create?
A: Default limit is 100 policies per tenant. Contact support to increase.

Q: Can policies be applied to specific users within a tenant?
A: Yes. Policies can target specific roles, groups, or individual users within a tenant.

Compliance questions

Q: Are tenant policy changes logged?
A: Yes. All policy changes are logged with timestamp, user, and before/after states.

Q: Can we export tenant policies for compliance audits?
A: Yes. Policies can be exported in JSON, YAML, or PDF format.

Q: How do tenant policies work with SOC 2 requirements?
A: Tenant-level policies support SOC 2 by enabling customers to implement their own access controls while you maintain platform-level compliance.


Summary

Tenant-Level Policies transform your platform from a one-size-fits-all solution into a flexible, enterprise-ready AI governance platform. By delegating policy control to your customers while maintaining platform-level boundaries, you:

  • Reduce support burden: Customers self-manage their requirements
  • Accelerate enterprise adoption: Meet diverse compliance needs
  • Increase customer satisfaction: Each tenant gets exactly the controls they need
  • Maintain platform integrity: Your boundaries cannot be overridden

Enable Tenant-Level Policies today to unlock the full potential of delegated AI governance.