Permissions & scopes
DocJacket's MCP server exposes three scope tiers and supports per-tool toggles inside the AI client. Together they give you a layered control surface — coarse from DocJacket, fine-grained from the assistant — over what each AI can do on your behalf.
The three scopes
| Scope | What it covers | Approval flow |
|---|---|---|
read | Search, lookup, list — search_transactions, get_transaction, get_key_dates, get_open_tasks, get_contacts, list_open_contingencies, get_upcoming_key_dates, get_next_required_actions, mcp_catalog, mcp_health_check, all find_* tools | Auto-approved per conversation (most clients ask once, then run inline) |
draft | Prepare emails, task suggestions, status summaries for your approval | The conversation is the approval gate — confirm in chat before each call |
actions | Send communications, create / update records — send_*, create_*, update_*, apply_*, complete_task, log_activity | Same — confirm in chat before each call |
When you connect an assistant, DocJacket's consent screen lists all three so you can pre-authorize. You can grant any subset.
The conversation is the approval gate
Every supported MCP client (Claude / ChatGPT / Codex / Cowork / Gemini) has a built-in confirm-then-execute UX for write tools:
- You ask the assistant to do something.
- The assistant proposes the action in chat — what tool, what arguments, against what data.
- You confirm or redirect.
- The assistant fires the tool only after you say yes.
DocJacket's server does not run a separate approval queue. We retired the "Pending Review" tray in May 2026 — the chat already gates every write, so a second approval inside DocJacket was just duplicate work.
Read the retirement spec for the full rationale.
Per-tool toggles (client-side)
Beyond the three scopes, every AI client lets you toggle individual tools off:
- Claude.ai / Claude Desktop: Settings → Connectors → DocJacket → click any tool to toggle. Tools default to Needs approval for the first call; you can switch to auto-allow per-tool.
- ChatGPT: Settings → Connectors → DocJacket → toggle individual tools. Same approval-first default.
- Codex CLI: Configure per-tool overrides in
~/.codex/connectors.jsonor usecodex policyto set defaults.
DocJacket enforces the scope tier at the server. The per-tool toggle is enforced by the AI client. Both have to allow a tool for it to run.
Read-only by default
The safest pattern — and what we recommend for first-time users — is to consent to read only at the DocJacket consent screen. Your assistant can search, look up, and summarize without ever being able to send an email or create a task.
When you're comfortable, re-consent and add draft + actions. You can revoke and re-grant any time.
Audit log
Every MCP tool call lands in your Activity Log within seconds:
- DocJacket → Settings → AI Access → Activity Log
Each row shows:
- The connected client (Claude / ChatGPT / Codex / Cowork / Gemini)
- The user who triggered it (you, or any other user in your org)
- The tool name (
search_transactions,send_agent_followup, etc.) - The arguments passed
- The outcome (success / error)
- Latency in milliseconds
- A timestamp
Filter by client to see what one AI surface has been doing. Filter by tool to spot unusual activity. The log is per-organization and immutable.
Revoking
Settings → AI Access → Connected Clients (for OAuth) or Personal Access Tokens (for bearer).
Click Revoke on any row. The next tool call from that client returns HTTP 401. The user will either fall back to re-consent (if they want to reconnect) or fail gracefully.
There's no propagation delay. Revocation lands on the next request.
What an assistant cannot do
Even with actions scope granted and a tool toggled on, an assistant cannot:
- See data from a different organization than the one you consented for
- Change your DocJacket account settings, billing plan, or user permissions
- Read other Connectors you've enabled on the assistant (e.g., your Gmail content)
- Bypass DocJacket's role-based access (e.g., if you're an org member without Admin rights, the AI inherits your access — not your owner's)
Tenant isolation is enforced at the SQL layer. Every MCP tool call adds WHERE OrganizationId = @TokenOrg to the underlying query. The AI cannot supply the org ID — it comes from the token.
Read more
- How OAuth works — the underlying protocol and token model
- How OAuth works (MCP summary) — short version
- Tool Catalog — the live tool inventory grouped by category
- AI Access overview — the umbrella feature