Console Guide

The PhronEdge Console at phronedge.com/brain is where CISOs, compliance officers, and platform engineers manage AI governance. Developers run the CLI and SDK. The Console is the governance surface.

This guide describes the Console's structure, the primary workflows, and which surface (SDK, CLI, or Console) is appropriate for each operation.

The Console at a glance

The Console has five primary views plus a Settings panel.

ViewAudiencePurpose
Policy BuilderPlatform team, CISODefine and sign governance policies
ArchitectureArchitecture review, CISOVisualize the signed governance structure
ObserverCISO, SOC teamReal-time monitoring, agent lifecycle
Audit LogCompliance, auditorsSearchable event history with regulatory citations
API KeysPlatform teamProvision SDK credentials

Policy Builder

A step-by-step form that produces a signed constitutional policy. No code required.

The Builder walks through three logical steps:

Organization. Your regulatory context. HQ jurisdiction, industry, data types handled, data residency, deployment jurisdictions. These inputs drive the Brain's framework resolution.

Agents and Tools. Every AI agent you deploy, its tier, its data clearance, its tool access, its behavioral baseline, its token budget. Every tool, its data classification, minimum tier, allowed jurisdictions, and permissions.

Organization Policy. Tenant-wide ceiling. Allowed models, global deny patterns, auto-quarantine triggers, escalation rules, threat detection settings.

Click Sign and Deploy. The Brain evaluates against applicable regulatory frameworks. Compliant policies are signed, credentials are issued, events are anchored. Policies with gaps return a remediation report.

The Builder has two action modes: Build (signs for review, no credentials issued) and Sign and Deploy (issues credentials). Build is for pre-approval review. Sign and Deploy is the production commitment.

Architecture View

Renders the signed policy as an interactive governance graph. Organization at top. Agents below. Orchestrators above their sub-agents with parent-child edges. Tools below the agents that use them.

Click any node to see its full configuration.

Every signed policy is viewable as:

  • JSON - Machine-readable artifact
  • YAML - Human-readable for version control
  • OPA Rego - Complete policy bundle with denial reasons and regulation citations

Export artifacts directly to your version control, object storage, or custom webhook from the Export action.

Observer

Real-time governance monitoring. The operational surface for your SOC team.

Top metrics: Requests allowed, requests blocked, PII detections, injection attempts, tamper events, lifecycle events. Updated live.

Events chart: Time-series of allowed vs blocked activity.

Agent fleet: Every agent as a card showing state (Active, Quarantined, Killed), tool count, recent activity, and action buttons. Sub-agents nest inside their orchestrator's card.

Activity feed: Real-time scrolling event list with regulation citations. Click for full event details including SHA-256 hash and chain linkage.

System status: Live status of each of the five powers (Observer, Judge, Enforcer, Brain, Anchor).

Constitutional Laws panel: The four principles that govern PhronEdge's enforcement decisions.

Audit Log

Searchable, filterable history of every governance event. Separate from the live feed.

Filter by agent, event type, severity, category, or date range. Export the filtered view as a signed audit pack.

Every event shows its regulation citation, the checkpoint that triggered it, and its place in the cryptographic chain.

Settings

Tenant administration. Profile, team and permissions, security, integration, and the Danger Zone.

Team and Permissions supports role-based access with separation between policy signing, agent lifecycle, audit review, and tenant administration.

Security shows the active signing key and provides key rotation. Key rotation is Console-only.

Danger Zone handles tenant deletion with multi-step confirmation.

Which surface for which operation

The product has three surfaces: SDK (runtime), CLI (developer and CI/CD), Console (governance). Each is designed for a specific audience and a specific set of operations.

OperationSurfaceWhy
Runtime tool governanceSDKEnforcement happens at every call
Policy build in CICLIScriptable, version-controllable
Policy signing and deploymentCLI or ConsoleEither is authoritative
Policy review and visualizationConsoleVisual architecture graph
Real-time monitoringConsoleLive telemetry, agent cards
Agent quarantineCLI, SDK, ConsoleReversible, multiple paths
Kill switchConsole onlyPermanent, requires authenticated session
Signing key rotationConsole onlyPrivileged, multi-step confirmation
Team managementConsole onlyTenant administration
Chain verificationCLI or ConsoleSame cryptographic check
Audit exportCLI or ConsoleSigned artifacts, same format

Pattern: Reversible operations are available in all three surfaces. Privileged or irreversible operations are Console-only to enforce authenticated session context.

Dual-track workflows

Common operations have both a developer path and a CISO path.

Signing a policy. Developer runs phronedge policy deploy policy.yaml in CI. CISO walks through the Policy Builder and clicks Sign and Deploy. Both produce the same signed artifact and the same POLICY_SIGNED event.

Verifying the chain. Developer runs phronedge chain verify. CISO clicks the Verify hash chain button in the Observer. Same cryptographic check. Same result.

Quarantining an agent. Developer calls pe.quarantine() or runs phronedge agent quarantine. CISO clicks the Quarantine button on the agent card. Same effect.

Exporting for audit. Developer runs phronedge export rego. CISO opens the Architecture view and copies the OPA tab. Same Rego bundle with the same regulatory citations.

This dual-track design is deliberate. It ensures that every operation with enterprise significance is accessible to the person responsible for the decision, whether that person works in code or through a browser.

Observer and human oversight

Regulated AI deployments require demonstrable human oversight. The Observer is the oversight surface.

The Observer provides what regulators expect to see:

  • Real-time visibility into agent behavior
  • Immediate intervention controls (quarantine, reinstate, kill)
  • Cryptographic proof that past events have not been modified
  • Regulatory citation on every blocked event

Your regulator asking "how does a human intervene" points to the Observer and its agent lifecycle controls. Your compliance team's evidence of effective oversight is the chain of authenticated Console actions, all signed and anchored.

Getting full detail

The Policy Builder field reference, the Settings admin guide, the complete operator playbook for each Console action, and the full SDK-CLI-Console capability matrix are available to registered customers.

Next steps

Previous
REST API Reference
Next
Enterprise Deployment