---
title: "Approval Workflows | Workshop"
description: "Workshop"
doc_version: "1"
last_updated: "2026-05-22"
canonical: "https://northpole.security/features/approval-workflows"
---
![](https://northpole.security/images/workshop/figma/hero-bg.png)

# Lockdown without the lockup

Workshop's flexible approval workflows keep teams productive while maintaining security.

[Book a demo](https://northpole.typeform.com/to/SG9jCi0v) [View documentation](https://northpole.security/docs/workshop)

 ![Workshop approval workflow in Slack](https://northpole.security/_astro/hero.CCx-onLM_Z1jkQkR.png)

![](https://northpole.security/images/workshop/figma/snow-corner-tr.png) ![](https://northpole.security/images/workshop/figma/snow-floor.png)

The dilemma

## The allowlisting dilemma

Choose between locking everything down or letting everything through. There has to be a better way.

### Too strict

Pure lockdown blocks legitimate work. Every new tool turns into a ticket queue.

-   IT becomes the bottleneck
-   Users get frustrated
-   Shadow IT increases

### Too loose

Monitor-only mode provides visibility but no protection.

-   Everything runs, including malware
-   You just get logs
-   Security falls behind

Workshop's answer

## Flexible approval workflows

Keep lockdown's protection while giving users safe ways to approve the software they need. Security stays in control of policy. Users get unblocked in minutes, not days.

Workflows

## Choose your workflow. Or run several.

Mix and match across teams. Use stricter workflows for sensitive groups, lighter ones for low-risk environments.

 ![Branching paths illustrating flexible approval routing across teams](https://northpole.security/_astro/workflows-flexibility.CapBi2wZ_2uSPhC.jpg)

1.  01
    
    ### Self-service
    
    Users approve their own software after the Risk Engine validates it against VirusTotal, ReversingLabs, and any custom plugins you wire in. Self-approval only proceeds when every check comes back clean. Best for low-risk environments and developer teams.
    
2.  02
    
    ### Manager approval
    
    The requester's direct manager must sign off before a binary is allowed. Workshop pulls reporting structure from your IdP (Okta, Google, Entra) so the right manager is routed automatically. Best for compliance-sensitive environments.
    
3.  03
    
    ### Specific approvers
    
    Designated security team members review every request. Requests queue up in a shared inbox with Risk Engine results pre-attached, so reviewers approve or deny in seconds instead of triaging raw alerts. Best for high-security environments.
    
4.  04
    
    ### Tag-based
    
    Any member of a tagged group can approve on behalf of the team. Tags map to your org (platform-eng, design, soc-tier-2) so you distribute approval authority without giving everyone global admin. Best for team-based, distributed responsibility.
    
5.  05
    
    ### Social voting
    
    Peer consensus with configurable local and global thresholds. Once enough trusted coworkers have independently run a binary without issue, it is automatically promoted to an org-wide allow rule. [Learn more about social voting](https://northpole.security/features/social-voting).
    
6.  06
    
    ### Slack-native approvals
    
    Every workflow works directly in Slack. Requesters get a prompt the instant a binary is blocked, approvers get a rich message with one-click buttons, and the entire back-and-forth happens in the channel or DM where your team already lives.
    

Safety net

## Every approval has a safety net

The Risk Engine screens every request before it reaches an approver. No workflow, vote, or admin override can let known malware run.

 ![Workshop's Risk Engine flagging an approval request](https://northpole.security/_astro/risk-engine-new.DoeAbts-_Z1OFlgL.png)

In Slack

## Approve without leaving Slack

Workshop's Slack bot turns blocked executions into interactive approval requests. No context switching, no dashboard tabs.

 ![Workshop's Slack bot showing an interactive approval request](https://northpole.security/_astro/slackbot-approval.0TNSLia5_24C8PI.png)

### Rich context in every message

App name, publisher, signing identity, binary path, and the device it ran on. Everything an approver needs to make a decision, right in the message.

### Risk Engine results inline

VirusTotal, ReversingLabs, and custom rule results displayed before the approve button. If the Risk Engine flags it, the approve button is disabled automatically.

### One-click approve or deny

Interactive buttons for Approve, Report Malware, and Details. Voting progress updates live for social voting and multi-approver workflows.

### Multi-approver coordination

For designated approver workflows, the bot creates group DMs with the requester and approver. Or route all requests to a shared approval channel for team visibility.

Beyond Slack

## Email and web dashboard

For teams that prefer other channels or need a single pane of glass.

### Email

One-click approve and deny links land in the right approver's inbox. For teams that prefer email notifications or need an asynchronous fallback.

### Web dashboard

Full approval queue with search, filtering, and bulk actions. Built for high-volume environments and security teams that want a single pane of glass.

Audit trail

## Complete audit trail

Every approval decision is logged for compliance and incident response. Reconstruct any decision later with full context.

 ![Workshop audit log showing approval decisions](https://northpole.security/_astro/audit-log.Dz75yMTr_1exxuR.png)

-   ### Who requested
    
    User, device, manager, and team for every approval request, tied back to your IdP so identity is never ambiguous.
    
-   ### What was approved
    
    Binary name, hash, signing identity, Team ID, and full path. Every dimension Santa uses for enforcement is captured at decision time.
    
-   ### Who approved
    
    Approver identity, workflow type, and any voters or co-approvers. Multi-step approvals are recorded end to end.
    
-   ### Why it was approved
    
    Risk Engine results, justification text, and any policy tags applied. Reconstruct the decision later with full context.
    

## Approval workflows are part of Workshop

[Book a demo](https://northpole.typeform.com/to/SG9jCi0v)

[

### Risk Engine

Automated risk assessment for every binary.

](https://northpole.security/features/risk-engine)[

### Social voting

Peer consensus, not a ticket queue.

](https://northpole.security/features/social-voting)[

### File access authorization

Stop infostealers from reaching sensitive files.

](https://northpole.security/features/file-access-authorization)

## Sitemap

- [Home](https://northpole.security/index.md)
- [Workshop](https://northpole.security/workshop.md)
- [Santa](https://northpole.security/santa.md)
- [Features](https://northpole.security/features.md)
- [Cookbook](https://northpole.security/cookbook.md)
- [Docs](https://northpole.security/docs.md)
- [Blog](https://northpole.security/blog.md)
- [Glossary](https://northpole.security/glossary.md)
- [About](https://northpole.security/about.md)
- [Contact](https://northpole.security/contact.md)
