Governance, end to end. Enforced at every layer.
One RBAC model for people and agents. Provider and model allowlists, brokered credentials, and approvals on every sensitive action.
Governance, layered end to end.
One role-based access control (RBAC) model covers people and agents. The org sets what's possible; admins decide who gets to use what. Nothing happens unless it's authorized at every level above it.
- 01Who has access to TipoffAdmins invite users, assign roles and permissions, and optionally connect SSO with your IdP.
- 02Who can interact with an agentAdmins scope each agent to specific people, teams, or other agents. Private by default; opened up only when it should be.
- 03What's allowed at the org levelApproved connectors, enabled tools and event sources, and policies like human-approval-required or web-fetch allowlists. Off at the org level means off everywhere.
- 04What each agent (or person) can doWithin the org's rules, grants are made per-agent and per-person, scoped down to a subset of actions.
- 01Agent
Works the task and drafts the sensitive action.
- 02Runtime Paused
Pauses the run before the action executes.
- 03Approver
Reviews the draft in their notifications with the right context.
- 04Agent Resumed
Resumes from the paused step once approved.
Allowlist providers. Allowlist models.
Admins decide which AI providers Tipoff can reach, and which specific models inside each are allowed. Start on Tipoff's API keys, or bring your own per provider.
- Tipoff keysAnthropic3 of 4 models allowed
- BYO keysOpenAI2 of 6 models allowed
- Tipoff keysGoogle2 of 4 models allowed
- Vertex AIDisabled at org level
- BYO keysAWS Bedrock4 of 12 models allowed
- Azure AI FoundryDisabled at org level
- claude-opus-4-7 ALLOWED
- claude-sonnet-4-6 ALLOWED
- claude-haiku-4-5 ALLOWED
- claude-opus-4 BLOCKED
Start on Tipoff's managed keys. No vendor accounts, no extra setup.
Plug in your keys per provider. Traffic and billing land in your account.
Agents never see the keys.
Tipoff brokers every connector. OAuth consents, access tokens, and refreshes are managed by the platform. Agents get a capability reference, never a raw credential.
- connector slack.prod
- capability send_message
- auth managed
- token not exposed
No token or secret ever crosses into agent code. Revoke access in one place and every agent loses it immediately.
- oauth token xoxp-•••••••••••••
- refresh token xoxr-•••••••••••••
- expires in 42 min
- next refresh auto
- scope chat:write · channels:read
OAuth consent, token refresh, scope checks, and rotation all happen inside the platform, before any request leaves for the connector.
Looking for SOC 2, data residency, and enterprise controls? See the security overview