Biological Identity-Scoped Access During Discovery
by Nick Clark | Published March 27, 2026
Not all content in the index is accessible to all operators. Biological identity-scoped access constrains discovery traversal based on the verified identity of the human operator or the agent's established trust slope. Content that requires specific identity credentials is only accessible to discovery objects operating under verified biological identities that meet the content's access requirements.
What It Is
Biological identity-scoped access uses the biological identity layer to constrain which regions of the index are traversable during discovery. Each anchor can specify biological identity requirements for access: a minimum trust slope depth, a specific identity scope, or membership in a governed identity group. Discovery objects operating without sufficient identity credentials are denied access to those anchors.
Why It Matters
Content governance requires that access controls are enforced during discovery, not just during retrieval. A discovery object that can traverse to protected content and observe its semantic neighborhood descriptions may leak information about the protected content even without directly accessing it. Identity-scoped access prevents traversal into protected regions entirely.
How It Works
When a discovery object proposes a traversal step to an anchor with identity requirements, the admissibility gate evaluates the discovery object's associated biological identity credentials. If the operator's biological trust slope meets the anchor's requirements, the traversal proceeds. If not, the step is denied and the discovery object must find an alternative path.
The identity evaluation is integrated into the standard admissibility gate, not a separate access control layer. This ensures consistent governance across all traversal decisions.
What It Enables
Identity-scoped access enables discovery across indexes that contain content with varying sensitivity levels. A medical researcher's discovery agent can traverse freely through published research while being restricted from patient records. A defense analyst's discovery can access classified content appropriate to their clearance while being restricted from higher classifications. The access control is structural and operates at every traversal step.