Skip to main content
Version: Latest

Use Cases

The launch use case for PolicyArc is securing MCP access for AI agents — Claude Code, OpenCode, and anything else speaking the Model Context Protocol. Every tool call through the PBAC Gateway is introspected, every scope checked, every decision logged.


Primary use case

AI Agents and MCP

Claude Code and similar agents today run with the developer's credentials. There is no agent identity, no audit trail per agent, no policy at the tool-call boundary. PBAC changes that with an MCP Gateway that sits between every agent and every tool.

  • Trust tiers for agent clients (developer, CI, read-only, internal-trusted)
  • Scope checks on every tool call — not just at login
  • Live policy change without token reissue
  • Full audit log: agent identity, tool, scope, decision, timestamp

Read the full use case


MCP servers PBAC protects

The same gateway in front of any of these backends. Each row links to the configuration and scope catalog.

Full catalog

BackendCategoryExample scopes
GitHubSource controlgithub:repos:read, github:repos:write, github:prs:merge
GitLabSource controlget_project, list_tree, create_branch, commit, create_mr
Google WorkspaceProductivityworkspace:drive:read, workspace:gmail:send, workspace:calendar:write
Google DriveFile storagedrive:read, drive:write
SlackMessagingslack:read, slack:write
JiraIssue trackingjira:read, jira:write
JenkinsCI / buildsget_build, get_artifact, trigger_build
PostgreSQLDatabasesdb:read, db:write, db:ddl, db:admin

Don't see yours? Any HTTP API becomes a gateway-protected MCP server. Use the dashboard's Gateway tab to add a new backend with its tools and scopes, or contact us — we'll likely add it to the catalog.


Next steps

P
PolicyArc Assistant
Online
Hi! I'm the PolicyArc assistant. Ask me anything about PolicyArc — how it works, getting started, pricing, or how to secure your AI agents.