Access Control with Allowlists
Overview
Key Benefits
Configuration
Environment Variables
Variable
Description
Format
Example
Format Requirements
Usage Examples
Common Use Cases
1. Focus AI on Specific Schemas (Most Common)
2. Multi-Catalog Environment
3. Production Security Layer
4. Development Environment
How It Works
Hierarchical Independence
Parameter Resolution
Error Handling
Configuration Errors
Access Denied Errors
Performance Impact
Before Allowlists
After Allowlists
Security Considerations
Complementary Security
Important Notes
Troubleshooting
Common Issues
1. "No catalogs/schemas/tables returned"
2. "Table access denied" errors
3. Case sensitivity issues
Debug Mode
Migration Guide
From No Allowlists to Allowlists
Rollback Strategy
Best Practices
Performance Optimization
Security Best Practices
Operational Guidelines
Related Documentation
Last updated
Was this helpful?