Current Scope
- Role: platform_admin
- Tenant: 11111111-1111-1111-1111-111111111111
- Organization: org-runtime-smoke
- User: smoke-user
- Scope Source: baseline
Manage policy approvals and safety controls in plain language. Choose an action, keep tenant/organization/user scope visible, and submit.
encoding_contract_single_encode: mutation query values are encoded once in scoped redirects.
Use this workflow to apply governance changes without technical steps: choose the action, confirm tenant/organization/user scope, then submit.
Advanced JSON inspection is available below, but JSON editing is not required in this default action workflow.
Human-readable summary of active scope context.
Filter and review recent actions. This supports non-technical workflow verification and fast troubleshooting.
Filter and search audit history for faster drill-down by action, result, and free-text query.
Readable drill-down view for filtered audit events with pagination and event detail links.
Use pagination with page_size controls to navigate audit history via previous/next pages.
Page 1 of 1 (0 events)
| ID | Action | Result | Actor |
|---|---|---|---|
| No audit events found for current filter. | |||
Use these JSON views only for deep diagnostics. Default workflows above do not require JSON editing.
Full organization governance payload for advanced debugging.
{
"tenant_id": "11111111-1111-1111-1111-111111111111",
"org_id": "org-runtime-smoke",
"window_hours": 24,
"request_count": 0,
"total_tokens": 0,
"total_cost_micros": 0,
"avg_latency_ms": 0
}Full user governance payload for advanced debugging.
{
"tenant_id": "11111111-1111-1111-1111-111111111111",
"org_id": "org-runtime-smoke",
"actor_sub": "smoke-user",
"window_hours": 24,
"request_count": 0,
"total_tokens": 0,
"total_cost_micros": 0,
"avg_latency_ms": 0
}Complete audit payload for deep inspection.
{
"items": [],
"limit": 200
}