Keeptrusts Docs
Keeptrusts is a config-first AI governance platform. For most teams, the primary interface is policy-config.yaml: you declare the providers, policies, limits, and audit behavior you want, and the gateway enforces that configuration on every AI request.
Use this page when
- You are new to Keeptrusts and need to orient yourself across the documentation.
- You want to choose the right audience path (engineer, leader, or AI agent) for your role.
- You need a starting point for the config-first operating model.
The console, CLI, and optional API support that lifecycle. They help you validate, distribute, observe, and review the config — but the config remains the source of truth.
If you only read one orientation page before diving in, start with Config-First Workflow. It explains the operating model we recommend for almost every Keeptrusts deployment.
Primary audience
- Primary: Technical Engineers
- Secondary: AI Agents, Technical Leaders
Choose your audience path
Use the machine-oriented path to choose the right Keeptrusts sources for code generation, project setup, and integration-safe answers.
Technical EngineersGet from concept to running gatewayStart with the fastest engineering path for configuration, provider integration, deployment, and day-two operations.
Technical LeadersEvaluate operating model and rollout fitUse the leadership path to assess architecture, governance, cost control, compliance posture, and deployment models.
Start with the config workflow
See how policy-config.yaml stays central while the CLI, console, and API support validation, rollout, and operations.
Create a usable policy-config.yaml, lint it, test it, run the gateway, and send your first governed request.
Use the config reference when you need the supported document shapes, field semantics, and validation rules.
Roll outVersion and deploy configsSave validated drafts, compare versions, sync from Git, and roll the approved config out to gateways.
RunInstall the gateway and serve trafficInstall kt, load your config, and expose a governed OpenAI-compatible gateway endpoint.
What you control from config
Block, redact, rewrite, score, and escalate prompts and responses from one deterministic policy chain.
RouteProviders, models, and fallbackChoose where traffic can go, declare data-handling constraints, and define retries or fallback in YAML.
TestValidation and policy testsLint every config, run tests before rollout, and treat traffic-impacting changes like reviewed code.
ControlBudgets, wallets, and rate limitsControl who can spend what, cap traffic, and keep usage inside approved limits.
GroundKnowledge and governed contextBind curated knowledge assets so responses stay grounded, reviewable, and easier to verify.
ProveEvidence, review, and auditExport decision trails, inspect blocked traffic, and preserve operational evidence for auditors and incident responders.
Browse by job
Use the reference, config patterns, and policy-test docs to produce a versioned config you trust.
Roll outVersion, review, and deploy changesUse Configurations, version history, and managed rollouts to ship policy changes safely.
OperateRun the daily governance loopInvestigate decisions, review escalations, monitor spend, and export evidence from the console.
TroubleshootResolve operational issues quicklyUse the public troubleshooting, evidence, and investigation workflows when the live system does not match expected policy behavior.
Follow this order
Start with the config-first workflow so your team treats policy-config.yaml as the source of truth and uses every other surface around it.
Start with Quickstart so you have a working policy-config.yaml, a provider target, and an initial policy chain.
Use Configurations to move the tested config onto shared gateways with version history and rollback context.
Step 4Observe and iterateReview live outcomes in Events, escalations, spend, and exports so the next config change is driven by evidence.
Operating model
Keeptrusts runs as a gateway between your applications and upstream AI providers. The declarative config tells that gateway what to enforce, where traffic may go, which users or teams are limited, and what audit evidence to record.
Your deployment team may expose Keeptrusts as a managed hosted gateway, a self-hosted runtime, or both. The console, CLI, and chat workbench give your team operational visibility and human oversight without moving the source of truth out of config.
API is optional
Most users do not need to start with the API. Use the API reference only when you must automate a workflow that the CLI or console cannot already cover, such as custom provisioning or external orchestration.
Even in those cases, the recommended pattern is still to treat the declarative config as the canonical contract and let the API move versions of that contract around.
What these docs cover
- Declarative config: schema, policy controls, provider routing, testing, environment variables, and end-to-end examples.
- CLI and gateway runtime: bootstrap, lint, test, gateway startup, runtime inspection, and operator workflows.
- Config operations: saved versions, YAML authoring, rollout, drift review, events, escalations, exports, wallets, and audit evidence.
- Chat workbench and console: governed chat, knowledge grounding, connectors, approvals, and day-to-day review loops.
- API reference: lower-level automation support when the CLI or console is not sufficient.
- Operational troubleshooting: public guidance for incidents, evidence review, and policy rollout checks.
For AI systems
- Canonical terms: Keeptrusts, policy-config.yaml, config-first, gateway, console, CLI, control plane.
- This is the documentation root. Use it to discover entry points by audience or job.
- Priority next pages: Config-First Workflow, Quickstart, Declarative Config Reference, Install the Gateway.
- Machine-readable source list: llms.txt.
For engineers
- Start with Quickstart to produce a working
policy-config.yamland send your first governed request. - Use Install the Gateway if you need the
ktbinary first. - The console, CLI, and API are operational surfaces around the config — the config remains the source of truth.
For leaders
- Keeptrusts is a config-first platform — policy changes are reviewable, version-controlled artifacts, not hidden UI toggles.
- The platform supports local, hosted, and hosted gateway topologies. Evaluate your deployment model in Architecture and Deployment.
- Governance, spend control, and compliance evidence are built into the operating model from day one.
Next steps
- Config-First Workflow — understand the operating model
- Quickstart — write and run your first config
- Install the Gateway — get the
ktbinary - Console Overview — day-to-day operational UI
- Declarative Config Reference — full config schema