diff --git a/gatekeeperd.te b/gatekeeperd.te
index 39d9d210c21727b0b38f4a472f05914b64276e54..4d62ce4f7eb711742032f54753060e3c0c351444 100644
--- a/gatekeeperd.te
+++ b/gatekeeperd.te
@@ -3,6 +3,7 @@ type gatekeeperd_exec, exec_type, file_type;
 
 # gatekeeperd
 init_daemon_domain(gatekeeperd)
+binder_service(gatekeeperd)
 binder_use(gatekeeperd)
 allow gatekeeperd tee_device:chr_file rw_file_perms;
 
diff --git a/service.te b/service.te
index da01071b5e5d63f2a9b1716ee0f8ecce12ad2bb6..3dfa296cfcafbb6fa06d067d57c5535472cd9dde 100644
--- a/service.te
+++ b/service.te
@@ -1,10 +1,10 @@
 type bluetooth_service,         service_manager_type;
 type default_android_service,   service_manager_type;
 type drmserver_service,         service_manager_type;
+type gatekeeper_service,        app_api_service, service_manager_type;
 type healthd_service,           service_manager_type;
 type inputflinger_service,      service_manager_type;
 type keystore_service,          service_manager_type;
-type gatekeeper_service,        service_manager_type;
 type mediaserver_service,       service_manager_type;
 type nfc_service,               service_manager_type;
 type radio_service,             service_manager_type;
diff --git a/untrusted_app.te b/untrusted_app.te
index 1b7aaeefd0d8289b3c8db118428f5511c7164a48..5ad8c79bd1395571f4ce22fba8b158e8f7681ea2 100644
--- a/untrusted_app.te
+++ b/untrusted_app.te
@@ -93,10 +93,6 @@ allow untrusted_app persistent_data_block_service:service_manager find;
 allow untrusted_app { apk_tmp_file apk_private_tmp_file }:dir r_dir_perms;
 allow untrusted_app { apk_tmp_file apk_private_tmp_file }:file r_file_perms;
 
-# Apps using KeyStore API will request the SID from GateKeeper
-allow untrusted_app gatekeeper_service:service_manager find;
-binder_call(untrusted_app, gatekeeperd)
-
 ###
 ### neverallow rules
 ###