Controls define what Agents are allowed to access after an interaction has been authorized.
The first data control type is RAG (Retrieval Augmented Generation). RAG controls determine which data collections an Agent can retrieve on behalf of the originating Identities.
RAG controls follow a least privileged model. By default, all collections are denied. An Agent can retrieve documents only if access has been explicitly granted in a Policy.
RAG controls answer the question:
Which data collections can these users, through these Agents, retrieve content from and under what Conditions?
Granting Access to RAG Collections
During Discovery, the PlainID Authorization Platform connects to your vector databases, identifies available collections, and extracts existing metadata fields and filters. If enrichment is enabled, additional metadata may be generated. These elements are transformed into Policy ready building blocks.
To configure RAG controls:
- In the Policies section in the Environment sidebar, click on the relevant Authorization Workspace.
- Select a Policy or create one.
- In the Policy Canvas, click the plus (+) icon in the RAG Control component.
- In the side panel, review the available Collections.
.png)
You can grant retrieval access at either a collection level or a metadata-filtered level.
Granting Access to an Entire Collection
Use this option when access should apply to all documents within a specific collection.
To add a collection:
- In the Policies section in the Environment sidebar, click on the relevant Authorization Workspace.
- Select a Policy or create one.
- In the Controls section, click on RAG Controls. This opens the RAG Control side panel.
- Search for or browse to the relevant collection.
- Select the relevant collection.
The selected collection appears in the RAG Control widget on the canvas. This grants retrieval access to all documents within that collection.
Example use cases:
- Allow a finance Agent to access the entire
Public Financial Reportscollection. - Grant internal support teams full access to a knowledge base that is already segmented by environment.
This approach is appropriate when collections are logically separated by sensitivity or business domain.
Granting Access Using Metadata Filters
For fine-grained control, restrict access within a collection using discovered metadata fields.
During Discovery, the platform:
- Retrieves existing metadata Attributes from the vector database.
- Normalizes them into structured, Policy ready fields.
- Makes them available in the query builder interface.
This enables document-level authorization.
To apply metadata filters:
- In the Policies section in the Environment sidebar, click on the relevant Authorization Workspace.
- Select a Policy or create one.
- Select a collection in the RAG Control section.
- Click Filter next to the collection.
- In the query builder, define the required conditions using the available metadata fields.
.png)
The collection appears in the RAG Control widget with the defined conditions applied.
By combining collection selection and metadata filters, you can define precise, least privileged access to retrieval pipelines within your Policies.