# Retrieve all access control policies and their permission rules Requires permissions::read permission. Endpoint: GET /v2/policy Version: 1.0.0 Security: JWTAuthorizer ## Response 200 fields (application/json): - `description` (string) Policy description Example: "My policy description" - `name` (string) Policy name Example: "my-policy" - `resources` (array) - `conditions` (object) - `conditions.all` (object) Policy expression Example: {"eq":{"tg:node:tags:environment":["production"],"tg:node:tags:another-tag":["always-match"]},"ne":{"tg:node:tags:environment":["staging"],"tg:node:tags:another-tag":["dont-match"]}} - `conditions.all.ne` (object) Example: {"tg:node:tags:environment":["staging"],"tg:node:tags:another-tag":["dont-match"]} - `conditions.all.ne.additionalProperties` (array) Conditions to not match - `conditions.all.eq` (object) Example: {"tg:node:tags:environment":["production"],"tg:node:tags:another-tag":["always-match"]} - `conditions.all.eq.additionalProperties` (array) Conditions to match - `conditions.any` (object) Policy expression Example: {"eq":{"tg:node:tags:environment":["production"],"tg:node:tags:another-tag":["always-match"]},"ne":{"tg:node:tags:environment":["staging"],"tg:node:tags:another-tag":["dont-match"]}} - `conditions.none` (object) Policy expression Example: {"eq":{"tg:node:tags:environment":["production"],"tg:node:tags:another-tag":["always-match"]},"ne":{"tg:node:tags:environment":["staging"],"tg:node:tags:another-tag":["dont-match"]}} - `statements` (array) - `statements.actions` (array) - `statements.effect` (string) Statement effect Enum: "allow", "deny", "noop"