Customer Journeys
These journeys show how customers move through Keeptrusts once access is available. Use them when you want a task-oriented view instead of a page-by-page product tour.
Use this page when
- You need a task-oriented map of how customers move through Keeptrusts by lifecycle phase.
- You want to identify the right starting page for a specific outcome — evaluation, operations, governance, or administration.
- You are onboarding a new team and want to scope which journeys apply to their deployment maturity.
Journeys are grouped by lifecycle phase. Start with Getting Live, move into Operate and Investigate for daily work, then use Govern and Scale and Administer as your deployment matures.
Primary audience
- Primary: Technical Engineers
- Secondary: AI Agents, Technical Leaders
Journey map
Getting Live
| Journey | Primary user | Starts here | Success signal |
|---|---|---|---|
| Evaluate with the hosted gateway | Developer or platform owner | Quickstart + hosted gateway guide | First governed request appears in Events |
| Bring up a hosted gateway | Operator | Gateway setup + CLI install | Hosted gateway shows as connected |
| Start in chat and reach the first governed answer | End user or pilot team | Chat workspace URL | Redirect returns to chat after sign-in and the first prompt completes |
| Set up team-based access and RBAC | Org admin | Members & Teams | Every team member has the right role and scope |
Operate and Investigate
| Journey | Primary user | Starts here | Success signal |
|---|---|---|---|
| Roll out the first policy change | Platform owner | Configurations + Templates | New version deployed and visible in runtime views |
| Investigate a blocked request | Security or compliance reviewer | Events | Root cause and policy path are clear |
| Export evidence for an audit or incident | Reviewer, auditor, incident lead | Exports | Evidence packet is ready for handoff |
| Recover from low balance or a cost ticket | Finance owner, admin, or end user | Wallets + chat | Credits restored and the request can be retried |
| Review and resolve an escalation | Reviewer or team lead | Escalations | Escalation claimed, investigated, and resolved with audit trail |
Govern and Scale
| Journey | Primary user | Starts here | Success signal |
|---|---|---|---|
| Ground agents with knowledge base assets | Knowledge owner or platform admin | Knowledge Base | Active asset bound to agent and recalled at runtime |
| Connect Google Drive through connectors | Integration lead or admin | Connectors | Connector active, capabilities discovered, and bound to agent |
| Manage versioned configurations | Platform engineer | Configurations | Approved YAML changes are versioned and rolled out safely |
| Learn from conversation history | Knowledge owner or analyst | History | Valuable session condensed into a reusable knowledge asset |
| Control AI spend across teams | Finance owner or org admin | Wallets + Cost Center | Team wallets allocated, budgets enforced, spend visible |
Administer
| Journey | Primary user | Starts here | Success signal |
|---|---|---|---|
| Platform admin — manage plans, billing, and orgs | Platform admin | Admin console | Plans configured, orgs provisioned, billing active |
Journey 1: Evaluate with the hosted gateway
Choose this path when you want the fastest route from account creation to the first governed request.
- Finish Quickstart.
- Create an Access Key.
- Point your client at the hosted gateway URL.
- Send a test request.
- Open Events, Usage, and Gateways to confirm the request was governed.
Use this journey for evaluations, prototypes, and teams that do not want to operate gateway infrastructure yet.
Journey 2: Bring up a hosted gateway
Choose this path when your organization needs the runtime inside its own infrastructure perimeter.
- Create or select a configuration.
- Create a Gateway Key.
- Install
ktusing the CLI installation guide. - Run
kt gateway runwith the configuration and runtime credentials. - Confirm the hosted gateway appears in Gateways and Actions.
- Send a governed request through the hosted endpoint.
Use this journey when you need private networking, custom egress controls, or tighter runtime ownership.
Journey 3: Start in chat and reach the first governed answer
Choose this path when a user begins with the chat workbench rather than with the console or API.
- Open chat and type a draft prompt.
- If you are signed out, Keeptrusts redirects you to the console sign-in flow.
- After successful sign-in, Keeptrusts returns you to chat.
- If no deployment exists yet:
- First org admins or sole active users land in the chat workspace immediately while the first provider deployment or gateway setup is completed.
- Non-admins request setup from an admin.
- Send the first governed prompt.
- Confirm the conversation appears in history and the related event appears in the console.
Use this journey for pilots, internal assistants, and teams adopting the chat workbench as the first experience of the platform.
Journey 4: Set up team-based access and RBAC
Choose this path when your organization needs structured access control before opening the platform to multiple teams.
- Open Members, Teams and Roles in the console.
- Create teams that match your organizational structure.
- Invite members and assign roles —
owner,admin,member, orviewer. - Configure SSO (OIDC or SAML) if your organization uses an identity provider.
- Enable MFA or passkeys in Security Settings for additional protection.
- Verify each team member can access only the resources and pages their role permits.
- Set up wallet allocations per team if cost control is needed.
Use this journey when moving from a single-admin pilot to a multi-team production deployment.
Journey 5: Roll out the first policy change
Choose this path when a working runtime already exists and the next step is safe rollout.
- Start from a template or an existing configuration.
- Review the declarative config with the Declarative Config Reference.
- Validate the change.
- Roll it out to the target gateway.
- Confirm the running config from Configurations and Gateways.
- Watch Events and Escalations for the first traffic after rollout.
Use this journey when your team is shifting from evaluation into governed production changes.
Journey 6: Investigate a blocked request
Choose this path when a user, operator, or reviewer needs to understand why traffic was blocked or escalated.
- Open the affected request in Events.
- Inspect the verdict, matched policy, and request metadata.
- Follow the related conversation, session, or escalation if present.
- Compare the event to the current configuration version.
- Decide whether the result reflects policy intent, a misconfiguration, or a true incident.
Use this journey for day-to-day review work, incident triage, and policy tuning.
Journey 7: Export evidence for an audit or incident
Choose this path when a decision, escalation, or incident must be handed off outside the console.
- Define the review window and scope.
- Generate the export in JSON or CSV.
- Validate the file contents.
- Pair the file with the relevant request IDs, escalation IDs, or incident references.
- Hand off the evidence packet.
Use this journey for audits, compliance reviews, customer investigations, and internal incident response.
Journey 8: Recover from low balance or a cost ticket
Choose this path when wallet controls are enabled and a request cannot proceed because the balance is too low.
- Open the wallet balance view in chat or the Wallets page.
- Review which scope ran out of headroom: user, team, or organization.
- Top up or reallocate credits — use PayPal self-service from chat or the Cost Center, or ask an admin to allocate from the org wallet.
- Retry the request if a cost ticket was issued.
- Confirm the request now settles successfully and the wallet ledger reflects the spend.
Use this journey when your team operates prepaid credits or wants predictable governance around AI spend.
Journey 9: Review and resolve an escalation
Choose this path when a gateway decision has been flagged for human review.
- Open Escalations and filter to queued items in the relevant time range.
- Confirm your reviewer identity displayed in the console.
- Open the escalation detail drawer — inspect the request ID, reason code, config version, and related event.
- Cross-check the related event behavior in Events if context is unclear.
- Claim the escalation when you are taking ownership.
- Record a resolution note and choose the appropriate outcome (allow, block, policy tuning).
- Confirm the irreversible resolve action in the dialog.
Use this journey for daily review queues, incident triage, and compliance sign-off.
Journey 10: Ground agents with knowledge base assets
Choose this path when you want agents to use curated context — policies, FAQs, product docs, or learned insights — at runtime.
- Navigate to Knowledge Base and click Create asset.
- Choose the asset kind: Static (markdown), Upload (file), or Git Sync (repository-backed).
- Author or upload the content. Each save creates an immutable version.
- Promote the asset through the lifecycle:
draft→in_review(enterprise) →active. - Go to the Bindings tab and bind the asset to the target agent.
- Send a governed request through that agent and confirm the knowledge was recalled — check the citation record in the event detail.
Use this journey when you need agents to draw on curated, versioned, and auditable context instead of relying solely on the model's training data.
Learn more: Knowledge Base · Knowledge Lifecycle · kt knowledge-base CLI
Journey 11: Connect Google Drive through connectors
Choose this path when you want agents to access Google Drive through governed read-only integrations.
- Navigate to Connectors and click Add connector.
- Choose Google Drive.
- Complete the Google OAuth authorization flow.
- Click Refresh capabilities to discover available tools and resources.
- Add a binding to the target agent, task, or runner.
- Send a governed request and confirm the connector's capabilities are available at runtime.
Use this journey when agents need to read from Google Drive without exposing write access or uncontrolled API calls.
Learn more: Connectors
Journey 12: Manage versioned configurations
Choose this path when your team reviews policy YAML outside Keeptrusts and then needs to validate, version, and deploy the approved change through the console.
- Open Configurations.
- Create a new configuration or open an existing one.
- Import or paste the approved YAML into the Monaco editor.
- Run validation and save a new version.
- Deploy the approved version to the target gateways.
- Verify the gateway is running the updated config from Gateways and Actions.
Use this journey when your team manages policy-as-code in Git but wants rollout, validation, and audit evidence to happen inside Keeptrusts.
Learn more: Configurations · Create Configuration
Journey 13: Learn from conversation history
Choose this path when a valuable conversation should be condensed into reusable knowledge for future agent sessions.
- Open History and browse captured sessions.
- Find a session with valuable insights — product decisions, resolved issues, or expert answers.
- Click Create learned knowledge in the session action bar.
- The system synthesizes a knowledge asset from the session content.
- Review the generated content on the new asset's detail page.
- Promote the asset to
activeand bind it to the relevant agent. - Confirm future requests recall the learned context.
Use this journey when you want agents to continuously improve by learning from real conversations.
Learn more: History and Sessions · Knowledge Base
Journey 14: Control AI spend across teams
Choose this path when your organization needs budget governance — prepaid credits, team allocations, and spend visibility.
- Review organization spend in Usage and confirm the available wallet balance through the current wallet funding workflow.
- Allocate credits to teams using the allocation API or console.
- Set alert thresholds so you receive notifications before balances run low.
- Configure PayPal top-up settings if self-service funding is enabled.
- Review model pricing records to ensure cost estimates are accurate.
- Monitor spend from Cost and Spend and My Usage.
- Export spend data for finance review if needed.
Use this journey when your organization needs predictable AI budgets with per-team accountability.
Learn more: Wallets · Cost and Spend
Journey 15: Platform admin — manage plans, billing, and orgs
Choose this path when you are a platform administrator managing the Keeptrusts deployment for multiple organizations.
- Sign in to the admin console.
- Review and configure available plans and storage quotas.
- Provision new organizations and assign owners.
- Configure payment settings and PayPal integration.
- Seed model pricing records for accurate cost tracking.
- Monitor organization health, resource usage, and billing status.
- Manage platform-wide security settings and feature flags.
Use this journey when operating Keeptrusts as a managed service or internal platform.
For AI systems
- Canonical terms: Keeptrusts, Customer Journeys, lifecycle phases, Getting Live, Operate and Investigate, Govern and Scale, Administer.
- Feature and page names referenced: Quickstart, Access Keys, Gateway Keys, Gateways and Actions, Events, Escalations, Exports, Configurations, Knowledge Base, Connectors, History, Wallets, Cost Center, Members Teams and Roles, Security Settings.
- This page is a navigation index — route to the specific journey section or the linked feature page for implementation detail.
For engineers
- Each journey lists a Success signal — use it as the validation checkpoint for that workflow.
- Start with Journey 1 or Journey 2 to confirm your gateway runtime is healthy before attempting policy changes (Journey 5).
- If an investigation journey (6, 7, 9) does not resolve, cross-reference the Troubleshooting page for common failure modes.
For leaders
- Use the journey map to scope rollout phases — most organizations start with Getting Live, then move into Operate and Investigate within the first week.
- Journey 4 (RBAC) and Journey 14 (spend control) are the key governance checkpoints before scaling to multiple teams.
- Journey 15 (platform admin) applies only if you operate Keeptrusts as a managed service for multiple organizations.