Source Workflow
A user action creates an AI-bound request.
Clariva runs as an API/SDK control layer in the customer's approved environment, checking policy, proof, replay state, provider eligibility, and audit requirements before a provider call proceeds.
Each step has a clear purpose so security, platform, and engineering teams can reason about what happened.
A user action creates an AI-bound request.
Sensitive content can be transformed by the customer application or by Clariva's policy-driven sanitization step inside the deployed control layer.
The request carries evidence about the control path.
Challenge and nonce details are checked to reject reused requests.
Clariva checks whether the request is allowed for that workflow.
Approved requests move to an eligible provider route.
Failed requests return a clear reason and do not continue.
The decision path is preserved for review.
The request includes enough structure for Clariva to decide whether the workflow is allowed to reach a provider. Full implementation details can be handled in developer documentation or SDK reference material.
A typical API evaluation starts by routing one AI-bound workflow through the deployed Clariva control layer in the customer's approved environment instead of sending it directly to the model provider.
The request contract is evaluated through controlled synthetic/test-tenant evidence artifacts before broader integration review.
{
"scenarioId": "tier1_rejected_decision",
"requestId": "req_tier1_rejected_decision",
"decision": "REVIEW_REQUIRED",
"reasonCodes": [
"proof_verification_failed",
"policy_denied"
],
"providerExecutionStatus": "not_executed",
"routeStatus": "rejected",
"proofReplayStatus": "REJECTED",
"auditReference": "audit:tier1:rejected"
}These starter contract examples show the evaluation inputs Clariva reviews for a bounded workflow: source, requested provider route, policy context, and evidence needs. They are synthetic examples and do not include raw customer data, provider output, tokens, or secrets.
Website-safe illustrative examples. Final endpoint, deployment base URL, payload shape, authentication, production schema, and deployment responsibilities are confirmed during evaluation and contract review. Recommendation path fields are website-safe routing hints from starter intake, not complete executable public endpoint documentation.
{
"method": "POST",
"path": "/v1/starter-intake",
"body": {
"orgId": "org.default",
"workspaceId": "workspace.one",
"starterProfileId": "api_sdk_starter",
"sourceType": "api",
"integrationSurface": "direct_api",
"policyTemplateId": "api_sdk_default",
"providerRouteId": "provider.route.direct_api",
"dataClasses": ["api_key", "email", "person_name"],
"evidenceLevel": "standard",
"environment": "sandbox",
"signedIngressRequired": false,
"regulatedReviewRequired": false,
"providedProofSurfaces": ["payloadCommitmentHash", "proofArtifact"],
"completedReadinessItems": [
"direct_api_client_configured",
"proof_artifact_ready",
"tenant_scope_confirmed"
],
"rawContentOnly": false,
"backendProofSubstitutionRequested": false
},
"expected": {
"recommendedPolicyTemplate": "api_sdk_default",
"apiSdkPath": "/v1/requests",
"manualReviewRequired": false
}
}
{
"method": "POST",
"path": "/v1/starter-intake",
"body": {
"orgId": "org.default",
"workspaceId": "workspace.one",
"starterProfileId": "crm_workflow_starter",
"sourceType": "crm.note",
"integrationSurface": "crm_workflow",
"policyTemplateId": "crm_notes_default",
"providerRouteId": "provider.route.crm_default",
"dataClasses": ["api_key", "email", "person_name"],
"evidenceLevel": "standard",
"environment": "sandbox",
"signedIngressRequired": false,
"regulatedReviewRequired": false,
"providedProofSurfaces": ["proofArtifact", "sourceRecordId"],
"completedReadinessItems": [
"proof_artifact_ready",
"source_system_mapping_reviewed",
"tenant_scope_confirmed"
],
"rawContentOnly": false,
"backendProofSubstitutionRequested": false
},
"expected": {
"recommendedPolicyTemplate": "crm_notes_default",
"apiSdkPath": "/v1/integration-paths/crm",
"manualReviewRequired": false
}
}
{
"method": "POST",
"path": "/v1/starter-intake",
"body": {
"orgId": "org.default",
"workspaceId": "workspace.one",
"starterProfileId": "support_workflow_starter",
"sourceType": "support.ticket",
"integrationSurface": "support_workflow",
"policyTemplateId": "customer_support_default",
"providerRouteId": "provider.route.support_default",
"dataClasses": ["credit_card", "email", "person_name", "phone"],
"evidenceLevel": "standard",
"environment": "sandbox",
"signedIngressRequired": false,
"regulatedReviewRequired": false,
"providedProofSurfaces": ["proofArtifact", "sanitizedContentHash"],
"completedReadinessItems": [
"proof_artifact_ready",
"tenant_scope_confirmed",
"support_workflow_mapping_reviewed"
],
"rawContentOnly": false,
"backendProofSubstitutionRequested": false
},
"expected": {
"recommendedPolicyTemplate": "customer_support_default",
"apiSdkPath": "/v1/integration-paths/support",
"manualReviewRequired": false
}
}
{
"method": "POST",
"path": "/v1/starter-intake",
"body": {
"orgId": "org.default",
"workspaceId": "workspace.one",
"starterProfileId": "signed_webhook_starter",
"sourceType": "webhook.signed",
"integrationSurface": "signed_webhook",
"policyTemplateId": "signed_webhook_default",
"providerRouteId": "provider.route.signed_webhook",
"dataClasses": ["api_key", "email", "person_name"],
"evidenceLevel": "security_review",
"environment": "sandbox",
"signedIngressRequired": true,
"regulatedReviewRequired": false,
"providedProofSurfaces": ["proofArtifact", "signatureDigest"],
"completedReadinessItems": [
"proof_artifact_ready",
"tenant_scope_confirmed",
"webhook_signature_configured"
],
"rawContentOnly": false,
"backendProofSubstitutionRequested": false
},
"expected": {
"recommendedPolicyTemplate": "signed_webhook_default",
"apiSdkPath": "/v1/integrations/webhooks",
"manualReviewRequired": false
}
}
{
"method": "POST",
"path": "/v1/starter-intake",
"body": {
"orgId": "org.default",
"workspaceId": "workspace.one",
"starterProfileId": "enterprise_control",
"sourceType": "regulated.review",
"integrationSurface": "direct_api",
"policyTemplateId": "regulated_review_default",
"providerRouteId": "provider.route.enterprise_control",
"dataClasses": ["api_key", "credit_card", "email", "person_name", "phone"],
"evidenceLevel": "regulated",
"environment": "production",
"signedIngressRequired": false,
"regulatedReviewRequired": true,
"providedProofSurfaces": ["proofArtifact", "reviewCaseId"],
"completedReadinessItems": [
"direct_api_client_configured",
"proof_artifact_ready",
"tenant_scope_confirmed"
],
"rawContentOnly": false,
"backendProofSubstitutionRequested": false
},
"expected": {
"recommendedPolicyTemplate": "regulated_review_default",
"apiSdkPath": "/v1/requests",
"manualReviewRequired": true
}
}
The examples below are synthetic/test-tenant artifacts intended to show the shape of the review flow. Customer-specific evidence and deployment terms are scoped during evaluation.
Website-safe evidence source for the selected workflow.
Source: generated website-safe synthetic/test-tenant evidence artifacts.
[
{
"requestId": "req_tier1_admitted_decision",
"policyDecision": "ALLOW",
"status": "SUPPORTED",
"reasonCodes": [],
"evidenceReferences": [
{
"evidenceHash": "9ec4a3ac3655f93f42edcde106273f7ab07f508698bfab72527b14a56783094a",
"generatedAt": "2026-04-29T04:45:00.000Z"
}
]
},
{
"requestId": "req_tier1_rejected_decision",
"policyDecision": "REVIEW_REQUIRED",
"status": "REJECTED",
"reasonCodes": [
"proof_verification_failed"
],
"evidenceReferences": [
{
"evidenceHash": "d73cb44ef6887aca59c8c058e2048275d64a25c08ad86cd4abddf1aa2a7fd50e",
"generatedAt": "2026-04-29T04:45:00.000Z"
}
]
}
]
[
{
"scenarioId": "admitted_tier1_decision",
"requestId": "req_tier1_admitted_db_evidence",
"organizationId": "org_clariva_default",
"workspaceId": "ws_clariva_default",
"actorAttribution": "service:svc_tier1_evidence",
"decision": "ADMITTED",
"reasonCodes": [
"PROOF_ACCEPTED",
"POLICY_ALLOWED"
],
"policyBinding": {
"policyHash": "hash_policy_tier1_synthetic",
"policyVersion": 1
},
"providerExecutionStatus": "executed_after_verification",
"routeStatus": "completed",
"proofReplayStatus": "fresh_challenge_consumed",
"timestamp": "2026-04-29T12:00:00.000Z",
"auditReference": "audit_hash_admitted_tier1_synthetic",
"evidenceReferences": [
"timeline_hash_admitted_tier1_synthetic"
],
"eventHash": "audit_hash_admitted_tier1_synthetic",
"recordHash": "ff14e7dcf25a92e7be42e91aa46a42e1875c20286aa5f62db91468d94631cc04"
},
{
"scenarioId": "rejected_tier1_decision",
"requestId": "req_tier1_rejected_db_evidence",
"organizationId": "org_clariva_default",
"workspaceId": "ws_clariva_default",
"actorAttribution": "service:svc_tier1_evidence",
"decision": "REJECTED",
"reasonCodes": [
"PROOF_REPLAY_REJECTED"
],
"policyBinding": {
"policyHash": "hash_policy_tier1_synthetic",
"policyVersion": 1
},
"providerExecutionStatus": "not_started",
"routeStatus": "rejected",
"proofReplayStatus": "replay_rejected",
"timestamp": "2026-04-29T12:01:00.000Z",
"auditReference": "audit_hash_rejected_tier1_synthetic",
"evidenceReferences": [
"timeline_hash_rejected_tier1_synthetic"
],
"eventHash": "audit_hash_rejected_tier1_synthetic",
"recordHash": "0a7cfe8dab81f76cd5e80a4d1f99149a2aa3013f73caa10cc3b184d6baaa05ee"
}
]
{
"requiredFields": [
"scenarioId",
"requestId",
"organizationId",
"workspaceId",
"actorAttribution",
"decision",
"reasonCodes",
"policyBinding",
"providerExecutionStatus",
"routeStatus",
"proofReplayStatus",
"timestamp",
"auditReference",
"evidenceReferences",
"eventHash"
],
"fieldSources": {
"scenarioId": "synthetic evidence scenario id",
"requestId": "AuditRecord.requestId",
"organizationId": "ScopedAuditEventRecord.organizationId",
"workspaceId": "ScopedAuditEventRecord.workspaceId",
"actorAttribution": "EnterpriseRequest.actorPrincipalId and EnterpriseRequest.actorSubjectId",
"decision": "AuditRecord.summaryCode",
"reasonCodes": "AuditRecord.reasonCodesJson",
"policyBinding": "AuditRecord.policyLineageJson",
"providerExecutionStatus": "ComplianceRecordMetadata.hasProviderExecutionRecord",
"routeStatus": "EnterpriseRequest.lifecycleState",
"proofReplayStatus": "ChallengeLifecycleRecord.status and ReplayNonceRecord.replayKey",
"timestamp": "AuditRecord.occurredAt",
"auditReference": "AuditRecord.eventHash",
"evidenceReferences": "ComplianceRecordMetadata.timelineHash and AuditExportManifest.contentHash",
"eventHash": "AuditRecord.eventHash"
},
"scenarios": [
{
"scenarioId": "admitted_tier1_decision",
"requiredFieldPresence": {
"scenarioId": true,
"requestId": true,
"organizationId": true,
"workspaceId": true,
"actorAttribution": true,
"decision": true,
"reasonCodes": true,
"policyBinding": true,
"providerExecutionStatus": true,
"routeStatus": true,
"proofReplayStatus": true,
"timestamp": true,
"auditReference": true,
"evidenceReferences": true,
"eventHash": true
},
"recordHash": "ff14e7dcf25a92e7be42e91aa46a42e1875c20286aa5f62db91468d94631cc04"
},
{
"scenarioId": "rejected_tier1_decision",
"requiredFieldPresence": {
"scenarioId": true,
"requestId": true,
"organizationId": true,
"workspaceId": true,
"actorAttribution": true,
"decision": true,
"reasonCodes": true,
"policyBinding": true,
"providerExecutionStatus": true,
"routeStatus": true,
"proofReplayStatus": true,
"timestamp": true,
"auditReference": true,
"evidenceReferences": true,
"eventHash": true
},
"recordHash": "0a7cfe8dab81f76cd5e80a4d1f99149a2aa3013f73caa10cc3b184d6baaa05ee"
}
],
"evidenceReference": "6821d11e8ac00b5ae1faf63db440e6edb1696aaf11954d9fb1a73835b1eb7c60"
}
[
{
"scenarioId": "missing_proof",
"status": 400,
"responseStatus": "rejected",
"decision": "REVIEW_REQUIRED",
"reasonCode": "VALIDATION_ERROR",
"providerExecutionStatus": "not_executed",
"requestId": "req.api.no-proof.rejected.1",
"evidenceReference": "d73cb44ef6887aca59c8c058e2048275d64a25c08ad86cd4abddf1aa2a7fd50e"
},
{
"scenarioId": "malformed_payload",
"status": 400,
"responseStatus": "rejected",
"decision": "REVIEW_REQUIRED",
"reasonCode": "VALIDATION_ERROR",
"providerExecutionStatus": "not_executed",
"requestId": "req.api.malformed.rejected.1",
"evidenceReference": "d73cb44ef6887aca59c8c058e2048275d64a25c08ad86cd4abddf1aa2a7fd50e"
},
{
"scenarioId": "provider_route_mismatch",
"status": 409,
"responseStatus": "rejected",
"decision": "REVIEW_REQUIRED",
"reasonCode": "PROVIDER_SELECTION_FAILED",
"providerExecutionStatus": "not_executed",
"requestId": "req.api.provider-route-mismatch.1",
"evidenceReference": "d73cb44ef6887aca59c8c058e2048275d64a25c08ad86cd4abddf1aa2a7fd50e"
},
{
"scenarioId": "missing_runtime_config",
"status": 503,
"responseStatus": "rejected",
"decision": "REVIEW_REQUIRED",
"reasonCode": "REQUEST_REJECTED",
"providerExecutionStatus": "not_executed",
"requestId": "req.api.missing-runtime-config.1",
"evidenceReference": "d73cb44ef6887aca59c8c058e2048275d64a25c08ad86cd4abddf1aa2a7fd50e"
},
{
"scenarioId": "missing_challenge_config",
"status": 404,
"responseStatus": "rejected",
"decision": "REVIEW_REQUIRED",
"reasonCode": "NOT_FOUND",
"providerExecutionStatus": "not_executed",
"requestId": "req.api.challenge.missing.1",
"evidenceReference": "d73cb44ef6887aca59c8c058e2048275d64a25c08ad86cd4abddf1aa2a7fd50e"
},
{
"scenarioId": "replay_stale_proof",
"status": 409,
"responseStatus": "rejected",
"decision": "REVIEW_REQUIRED",
"reasonCode": "CONFLICT",
"providerExecutionStatus": "not_executed",
"requestId": "req.api.challenge.expired.1",
"evidenceReference": "d73cb44ef6887aca59c8c058e2048275d64a25c08ad86cd4abddf1aa2a7fd50e"
},
{
"scenarioId": "replayed_proof",
"status": 409,
"responseStatus": "rejected",
"decision": "REVIEW_REQUIRED",
"reasonCode": "CONFLICT",
"providerExecutionStatus": "not_executed",
"requestId": "req.api.challenge.consumed.1",
"evidenceReference": "d73cb44ef6887aca59c8c058e2048275d64a25c08ad86cd4abddf1aa2a7fd50e"
},
{
"scenarioId": "invalidated_proof",
"status": 409,
"responseStatus": "rejected",
"decision": "REVIEW_REQUIRED",
"reasonCode": "CONFLICT",
"providerExecutionStatus": "not_executed",
"requestId": "req.api.challenge.invalidated.1",
"evidenceReference": "d73cb44ef6887aca59c8c058e2048275d64a25c08ad86cd4abddf1aa2a7fd50e"
}
]
[
{
"scenarioId": "replay_lineage_mismatch",
"requestId": "req_tier1_replay_rejected",
"outcome": "REJECTED",
"reasonCode": "replay_lineage_mismatch",
"providerExecutionStatus": "not_executed",
"evidenceReference": "d73cb44ef6887aca59c8c058e2048275d64a25c08ad86cd4abddf1aa2a7fd50e"
},
{
"scenarioId": "stale_challenge",
"requestId": "req_tier1_stale_challenge",
"outcome": "REJECTED",
"reasonCode": "challenge_stale",
"providerExecutionStatus": "not_executed",
"evidenceReference": "9f11d5f0518ff656f7070ee2a48dac51242b6196a0c7ed8beb70e0a15b145112"
},
{
"scenarioId": "reused_challenge",
"requestId": "req_tier1_reused_challenge",
"outcome": "REJECTED",
"reasonCode": "challenge_reused",
"providerExecutionStatus": "not_executed",
"evidenceReference": "9f11d5f0518ff656f7070ee2a48dac51242b6196a0c7ed8beb70e0a15b145112"
},
{
"scenarioId": "missing_proof",
"requestId": "req_tier1_missing_proof",
"outcome": "REJECTED",
"reasonCode": "proof_missing",
"providerExecutionStatus": "not_executed",
"evidenceReference": "9f11d5f0518ff656f7070ee2a48dac51242b6196a0c7ed8beb70e0a15b145112"
},
{
"scenarioId": "malformed_proof",
"requestId": "req_tier1_malformed_proof",
"outcome": "REJECTED",
"reasonCode": "proof_malformed",
"providerExecutionStatus": "not_executed",
"evidenceReference": "9f11d5f0518ff656f7070ee2a48dac51242b6196a0c7ed8beb70e0a15b145112"
},
{
"scenarioId": "mismatched_proof",
"requestId": "req_tier1_mismatched_proof",
"outcome": "REJECTED",
"reasonCode": "proof_challenge_mismatch",
"providerExecutionStatus": "not_executed",
"evidenceReference": "9f11d5f0518ff656f7070ee2a48dac51242b6196a0c7ed8beb70e0a15b145112"
},
{
"scenarioId": "tampered_proof",
"requestId": "req_tier1_tampered_proof",
"outcome": "REJECTED",
"reasonCode": "proof_tampered",
"providerExecutionStatus": "not_executed",
"evidenceReference": "9f11d5f0518ff656f7070ee2a48dac51242b6196a0c7ed8beb70e0a15b145112"
}
]
Use this section to inspect how an application would route a narrow API evaluation through the deployed Clariva control layer before broader integration review.
const response = await fetch("https://<customer-deployment-base-url>/v1/requests", {
method: "POST",
headers: {
"Authorization": "Bearer CLARIVA_API_KEY",
"Content-Type": "application/json"
},
body: JSON.stringify({
workflow: "support_ticket_summary",
requestedProviderRoute: "provider.route.support_default",
payload: {
sanitizedText: "Customer cannot access [ACCOUNT_REFERENCE]."
}
})
});Clariva is designed so a failed request does not quietly fall through to a provider. Applications can handle rejection reasons directly.
Clariva sits in the request path before provider execution, so latency is measured during evaluation for the specific workflow, policy depth, provider route, and audit requirements. Evaluation focuses on whether the control step is acceptable for the customer’s production use case before broader rollout.
Use the starter contract and sample decisions to inspect how the deployed control layer handles an API-bound workflow.