Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.alterauth.com/llms.txt

Use this file to discover all available pages before exploring further.

Everything an end user can do in Alter Wallet.

Listing connections

The Wallet home page shows every grant in one list:
  • Provider (Google, Slack, GitHub, …)
  • App that holds it (e.g., “Email Assistant”)
  • Account identifier (the email or workspace it covers)
  • Scopes (what the app can read/write)
  • Status (active, expired, revoked)
  • Created at
Click any row to see its full activity log.

Revoking a grant

On any connection, click Revoke. Confirm. What happens:
  1. The grant status flips to revoked immediately.
  2. Stored tokens are deleted from the vault.
  3. The next API call any app makes for that grant fails.
  4. A security audit row records the revocation.
This action cannot be undone. To restore access, the app must run OAuth again, which creates a new grant.

Auditing agent activity

When apps call third-party APIs through AI agents, every call is logged with:
  • Which agent made the call (name, type, identifier)
  • What API was called (method + URL)
  • When it happened
  • Why — the developer-supplied reason string
  • Outcome — success, denied by policy, error
Filter the activity feed by:
  • App
  • Provider (only show Google calls, only show Slack, …)
  • Agent name (only show what “research-bot” did)
  • Date range
Export filtered logs as CSV for personal records or compliance review.

Managing delegations

Some apps use agents that act on an end user’s behalf — a research assistant that reads a calendar, a sales bot that writes Slack messages. Each agent that touches end-user data has a separate delegation under the underlying grant. Available actions:
  • See every agent with access to a given grant.
  • Revoke a specific agent’s delegation without touching the underlying grant. The app keeps using the account; only that agent loses access.
  • Revoke the underlying grant to revoke everything at once (use the Revoke button on the grant itself).

Extending a grant

When a developer sets a TTL (time-to-live) policy on a grant, Wallet shows a countdown to its expiry. Click Extend to push the expiry forward — up to the maximum the developer configured. Grants without a TTL do not show this option. Revoke the grant to end it.

End-user policies (coming soon)

Beyond revoking access, end users will be able to set their own rules:
  • Time windows — only allow agent access during business hours.
  • Action restrictions — read-only, no-send.
  • Agent allowlists — specify which agents are permitted.
  • Notifications — alerts on every call, or only on specific types.
Both the end user’s policies and the developer’s policies must pass for an API call to go through. Contact the team for early access.

See also