List policies
AUTHORIZATION: - ApiKeyAuth: Tenant can list their own policies only (scoped by authenticated tenant) - AdminKeyAuth: Accepted as alternative for read access (dual-auth).
When using AdminKeyAuth, tenant_id query parameter is REQUIRED for scoping.
Authorizations
Tenant-scoped API key for runtime operations (consistent with Cycles Protocol)
Administrative API key with full system access. Also accepted as an alternative to ApiKeyAuth on an explicit per-operation allowlist — the authoritative list is the union of operations whose security: block declares AdminKeyAuth (consult per-operation security blocks rather than this prose, which has historically drifted as the dual-auth surface expanded). When using AdminKeyAuth on list or fund endpoints, a tenant scoping parameter (typically tenant or tenant_id) is required for scoping (400 if missing) — the per-operation description specifies which. Lookup-style endpoints that uniquely identify a resource by non-tenant key (e.g. GET /v1/admin/budgets/lookup, where the (scope, unit) pair is unique) do NOT require a tenant parameter. Allowlisting is per-operation (exact method:path matching — no prefix matching, no wildcards) so new endpoints do not accidentally inherit admin-accessible status.
Parameters
Query Parameters
When using ApiKeyAuth: ignored — the authenticated tenant from the API key is always used for scoping. When using AdminKeyAuth: REQUIRED — specifies which tenant's policies to list. Returns 400 if missing when using AdminKeyAuth.
"ACTIVE""DISABLED"Optional. Filter to policies that have at least one action quota configured. Only meaningful on servers implementing the v0.1.26 action-quotas extension. Servers that don't recognize this parameter MUST ignore it without error (additive-parameter guarantee).
Optional. Filter to policies that mention the given action_kind in any quota rule or access control list. Enables incident investigation ("which policies block payment.charge?"). Only meaningful on servers implementing the v0.1.26 action-kinds extension. Servers that don't recognize this parameter MUST ignore it without error (additive-parameter guarantee).
6450Responses
Policy list