Skip to main content
Browse docs
By Audience
Getting Started
Configuration
Use Cases
IDE Integration
Third-Party Integrations
Engineering Cache
Console
API Reference
Gateway
Workflow Guides
Templates
Providers and SDKs
Industry Guides
Advanced Guides
Browse by Role
Deployment Guides
In-Depth Guides
Tutorials
FAQ

Keeptrusts Docs

Keeptrusts is a config-first AI governance platform. For most teams, the primary interface is policy-config.yaml: you declare the providers, policies, limits, and audit behavior you want, and the gateway enforces that configuration on every AI request.

Use this page when

  • You are new to Keeptrusts and need to orient yourself across the documentation.
  • You want to choose the right audience path (engineer, leader, or AI agent) for your role.
  • You need a starting point for the config-first operating model.

The console, CLI, and optional API support that lifecycle. They help you validate, distribute, observe, and review the config — but the config remains the source of truth.

If you only read one orientation page before diving in, start with Config-First Workflow. It explains the operating model we recommend for almost every Keeptrusts deployment.

Primary audience

  • Primary: Technical Engineers
  • Secondary: AI Agents, Technical Leaders

Choose your audience path

Start with the config workflow

What you control from config

Browse by job

Follow this order

Operating model

Keeptrusts runs as a gateway between your applications and upstream AI providers. The declarative config tells that gateway what to enforce, where traffic may go, which users or teams are limited, and what audit evidence to record.

Your deployment team may expose Keeptrusts as a managed hosted gateway, a self-hosted runtime, or both. The console, CLI, and chat workbench give your team operational visibility and human oversight without moving the source of truth out of config.

API is optional

Most users do not need to start with the API. Use the API reference only when you must automate a workflow that the CLI or console cannot already cover, such as custom provisioning or external orchestration.

Even in those cases, the recommended pattern is still to treat the declarative config as the canonical contract and let the API move versions of that contract around.

What these docs cover

  • Declarative config: schema, policy controls, provider routing, testing, environment variables, and end-to-end examples.
  • CLI and gateway runtime: bootstrap, lint, test, gateway startup, runtime inspection, and operator workflows.
  • Config operations: saved versions, YAML authoring, rollout, drift review, events, escalations, exports, wallets, and audit evidence.
  • Chat workbench and console: governed chat, knowledge grounding, connectors, approvals, and day-to-day review loops.
  • API reference: lower-level automation support when the CLI or console is not sufficient.
  • Operational troubleshooting: public guidance for incidents, evidence review, and policy rollout checks.

For AI systems

For engineers

  • Start with Quickstart to produce a working policy-config.yaml and send your first governed request.
  • Use Install the Gateway if you need the kt binary first.
  • The console, CLI, and API are operational surfaces around the config — the config remains the source of truth.

For leaders

  • Keeptrusts is a config-first platform — policy changes are reviewable, version-controlled artifacts, not hidden UI toggles.
  • The platform supports local, hosted, and hosted gateway topologies. Evaluate your deployment model in Architecture and Deployment.
  • Governance, spend control, and compliance evidence are built into the operating model from day one.

Next steps