Documentation
Technical documentation for Guardrail Layer — covering architecture, enforcement models, security boundaries, and real-world deployment patterns.
Getting Started
Overview of Guardrail Layer, core concepts, and how it fits between LLMs and production databases.
ViewMetadata
How Guardrail Layer uses schema metadata to understand tables, columns, relationships, and sensitivity boundaries.
ViewRoles & Users
Role-aware enforcement, permission models, and how access decisions are evaluated per user and agent.
ViewAudit Logging
Complete execution trails for every query, including decision context, rewrites, and enforcement outcomes.
ViewDeployment & Architecture
Guardrail Layer can be deployed as a managed service or fully self-hosted within your own infrastructure. The enforcement model remains identical across both approaches.