Skip to main content

Permissions & scopes

DocJacket's MCP server exposes three scope tiers and supports per-tool toggles inside the AI client. Together they give you a layered control surface — coarse from DocJacket, fine-grained from the assistant — over what each AI can do on your behalf.

The three scopes

ScopeWhat it coversApproval flow
readSearch, lookup, list — search_transactions, get_transaction, get_key_dates, get_open_tasks, get_contacts, list_open_contingencies, get_upcoming_key_dates, get_next_required_actions, mcp_catalog, mcp_health_check, all find_* toolsAuto-approved per conversation (most clients ask once, then run inline)
draftPrepare emails, task suggestions, status summaries for your approvalThe conversation is the approval gate — confirm in chat before each call
actionsSend communications, create / update records — send_*, create_*, update_*, apply_*, complete_task, log_activitySame — confirm in chat before each call

When you connect an assistant, DocJacket's consent screen lists all three so you can pre-authorize. You can grant any subset.

The conversation is the approval gate

Every supported MCP client (Claude / ChatGPT / Codex / Cowork / Gemini) has a built-in confirm-then-execute UX for write tools:

  1. You ask the assistant to do something.
  2. The assistant proposes the action in chat — what tool, what arguments, against what data.
  3. You confirm or redirect.
  4. The assistant fires the tool only after you say yes.

DocJacket's server does not run a separate approval queue. We retired the "Pending Review" tray in May 2026 — the chat already gates every write, so a second approval inside DocJacket was just duplicate work.

Read the retirement spec for the full rationale.

Per-tool toggles (client-side)

Beyond the three scopes, every AI client lets you toggle individual tools off:

  • Claude.ai / Claude Desktop: Settings → Connectors → DocJacket → click any tool to toggle. Tools default to Needs approval for the first call; you can switch to auto-allow per-tool.
  • ChatGPT: Settings → Connectors → DocJacket → toggle individual tools. Same approval-first default.
  • Codex CLI: Configure per-tool overrides in ~/.codex/connectors.json or use codex policy to set defaults.

DocJacket enforces the scope tier at the server. The per-tool toggle is enforced by the AI client. Both have to allow a tool for it to run.

Read-only by default

The safest pattern — and what we recommend for first-time users — is to consent to read only at the DocJacket consent screen. Your assistant can search, look up, and summarize without ever being able to send an email or create a task.

When you're comfortable, re-consent and add draft + actions. You can revoke and re-grant any time.

Audit log

Every MCP tool call lands in your Activity Log within seconds:

  • DocJacket → Settings → AI Access → Activity Log

Each row shows:

  • The connected client (Claude / ChatGPT / Codex / Cowork / Gemini)
  • The user who triggered it (you, or any other user in your org)
  • The tool name (search_transactions, send_agent_followup, etc.)
  • The arguments passed
  • The outcome (success / error)
  • Latency in milliseconds
  • A timestamp

Filter by client to see what one AI surface has been doing. Filter by tool to spot unusual activity. The log is per-organization and immutable.

Revoking

Settings → AI Access → Connected Clients (for OAuth) or Personal Access Tokens (for bearer).

Click Revoke on any row. The next tool call from that client returns HTTP 401. The user will either fall back to re-consent (if they want to reconnect) or fail gracefully.

There's no propagation delay. Revocation lands on the next request.

What an assistant cannot do

Even with actions scope granted and a tool toggled on, an assistant cannot:

  • See data from a different organization than the one you consented for
  • Change your DocJacket account settings, billing plan, or user permissions
  • Read other Connectors you've enabled on the assistant (e.g., your Gmail content)
  • Bypass DocJacket's role-based access (e.g., if you're an org member without Admin rights, the AI inherits your access — not your owner's)

Tenant isolation is enforced at the SQL layer. Every MCP tool call adds WHERE OrganizationId = @TokenOrg to the underlying query. The AI cannot supply the org ID — it comes from the token.

Read more