--- title: Security and Privacy Settings excerpt: >- Use this page in **Moveworks Setup → Security & Privacy** to configure powerful, **org-wide** controls for Agent Studio. These settings are intended for **Super Admins**. deprecated: false hidden: false metadata: robots: index --- **Changes take effect immediately.** Because these settings can block plugins or expose systems if misconfigured, each section below explains the behavior and risk tradeoffs. ![](https://files.readme.io/185ecdb50edcaae2f2f93c35d844be5dd44ed61e323b1d1932dd167b6720a306-CleanShot_2025-11-18_at_14.42.342x.png) ## Enable connector editing Allow selected Agent Studio developers (per **DSL rule**) to **edit HTTP connectors** (e.g., URLs, headers, auth config). ![](https://files.readme.io/ba575cb415edc3fb3bdc0f0acf1787ce38a4f026214a2e3e20577900f4607fcb-CleanShot_2025-11-18_at_14.42.462x.png) **What it does** * When the DSL rule evaluates to **TRUE** for a user, they can edit **any HTTP connector** referenced by their work in Agent Studio. * When **FALSE**, connectors are **read-only** in Agent Studio. **Risks** * **Outage risk:** editing a connector used by production plugins can break workflows instantly. * **Security risk:** misconfiguration can leak or weaken **credentials**, redirect traffic, or expand data access. **Recommendations** * Keep the DSL rule **narrow** (specific teams or roles). * Prefer enabling in **sandbox tenants**; require change control before enabling in prod. **How to configure** 1. Go to **Setup → Security & Privacy Settings → Enable connector editing**. 2. Define the **[DSL rule](/docs/moveworks-dsl-reference)** (who is allowed). Click **Validate Syntax** and **Submit**. 3. Changes apply immediately and are logged. ### Tip Set the rule to `FALSE` to disable editing for everyone, or to `TRUE` to allow for all developers. See the [DSL](/docs/moveworks-dsl-reference) and [User Attribute](/docs/user-attribute-reference) references for available fields.
## Enable built-in connectors in Agent Studio Allow selected Agent Studio developers (per **DSL rule**) to **use Moveworks built-in connectors** (ticketing, search, identity, etc.) inside Agent Studio. ![](https://files.readme.io/666759a9ecde140ed2cb7ad04da8d5208965bf2353b5466c8bcbb8dd4922e79e-CleanShot_2025-11-18_at_14.42.512x.png) **What it does** * When the DSL rule is **TRUE** for a user, built-in connectors become selectable in Agent Studio. * Editing those connectors still requires the **connector editing** rule to be TRUE **and** appropriate Setup access. * When **FALSE**, built-in connectors are hidden/unavailable in Agent Studio for that user. **Risks** * Built-ins often use **service accounts** with broad privileges (ingestion, polling, write actions). * May expose **sensitive data** (tickets, HR data, knowledge content) to plugins authored by users matching the rule. * Expands what developers can do—ensure this aligns with your internal data-access policy. **Recommendations** * Keep the DSL rule **strict** (trusted groups only). * Start in **sandbox**; roll out to production gradually. **How to configure** 1. Go to **Setup → Security & Privacy Settings → Enable built-in connectors in Agent Studio**. 2. Define the **[DSL rule](/docs/moveworks-dsl-reference)** (who can use built-ins). **Validate Syntax** and **Save**. 3. If users should also **edit** built-ins, enable **Enable connector editing** with its own (usually narrower) DSL rule. > 📘 Notes on DSL targeting (applies to both settings above) > > These settings are **not** “any developer.” Access is granted only when the **DSL rule evaluates to TRUE** for the user. Use your org’s attributes (role, department, location, team, groups).
## Strict log redaction Control whether developers can see raw user content in logs for **publicly launched** plugins. ![](https://files.readme.io/7b52833938149e057863826d40929f934a4b14539f54371700501248c34c2627-CleanShot_2025-11-18_at_14.43.062x.png) **What it does** When enabled, Moveworks **redacts user content** (utterances, message text, personal identifiers, and sensitive payload fields) from developer-visible logs. Metadata needed to operate still appears (timestamps, status codes, event IDs, step names, error classes). **When it triggers** Strict redaction is automatically applied to any plugin that is: * Launched to **10+ users**, or * Using **Launch to everyone** (org-wide), or * Using an **Advanced DSL audience** that resolves to **10+ users**. **Why enable it? (recommended for production)** * Prevents exposure of private/user data to developers. * Reduces privacy/compliance risk (e.g., PII appearing in logs). * Enforces a consistent privacy posture as plugins scale beyond small test groups. **Risks if OFF** * Developers can view **all** user interactions for broadly launched plugins including responses as well as user utterances and other potentially sensitive attributes. * Higher likelihood of inadvertent data exposure in logs, screenshots, exports, or shared tickets.
## Webhook Listener Security Choose how to handle **unsecured** webhook listeners in Agent Studio. Secured listeners ensure only authorized providers can send requests and prevent unauthorized access. [Learn more](/docs/webhooks-listener#/verification-options) about supported methods to verify incoming requests like Signature Verification (HMAC). **Changes take effect immediately and may block existing unsecured listeners.** _Blocked_ listeners stop receiving events until secured or exempted. [Learn more about webhook listeners ](/docs/webhooks-listener) ### Options **(Default) Allow only exempt unsecured listeners** Only listeners listed in **Listener Exemptions** may receive events without being secured. **All other unsecured listeners will Blocked**, and any plugins that reference them will not run. * **Listener Exemptions** Add specific listeners that you want to allow. All other unsecured listeners will be **Blocked**. _Field:_ “Listener ID or name” (searchable). **Allow all unsecured listeners** Any listener can receive events without verification or credentials. **Not recommended for production.** Unsecured listeners are heavily rate-limited and more vulnerable to abuse. _Note:_ You also need to check “Allow all unsecured listeners” to confirm this override. ### Behavior & impact * When a listener is **Blocked**: * The listener stays visible in Agent Studio but **stops receiving events** until secured or exempted. * Plugins that reference it **won’t run**. * The listener appears with a **Blocked** badge and an in-product banner linking to “Secure this listener.” * Securing a listener (e.g., **HMAC** or **credential verification**) immediately restores events. * Unsecured listeners (even when allowed) run under **[strict throttles](/docs/webhooks-listener#/security-and-verification)** suitable for testing, not production. ### Recommended practices * Prefer **HMAC (signature verification)** or **credential verification** for production. * Use exemptions sparingly to support sandbox/dev or vendors that can’t sign payloads.
## Troubleshooting & FAQs **Q: Who can change these settings?** **Super Admins** (or designated security admins). Changes are audited and apply org-wide. **Q: Some listeners now show as “Blocked.” What now?** Secure the listener (HMAC or credentials) or add it to **Listener Exemptions**. Once secured, events resume immediately. **Q: Some plugins now show as blocked. Why?** They reference **unsecured** listeners while the security requirement is in effect. Secure the listeners, or adjust the setting/exemptions.