<!-- loio2a891152af55448ca8350cc04fa829a7 -->
# Access Policies for API Artifact
Access policies for API artifacts enable you to control who can access and interact with your APIs and their data.
By defining these policies, you gain precise control over which users or systems can perform specific actions—such as creating/editing, or executing other operations—on the API. For example, unauthorized users might be granted permission only to view protected resources, such as integration flows, but restricted from performing actions like editing, copying, downloading, deleting, simulating flows, or monitoring message content. For more information, see [Managing Access Policies](managing-access-policies-318d107.md).
Access policies enable you to manage:
- API artifact operations in design time
- API artifact operations after deployment
- Data stored and processed by the artifact at runtime
For more information, see [Access Policies](access-policies-e0009f3.md) and [Defining Access Policies](defining-access-policies-b0d7950.md).