Members
The Members page lists everyone with access to your organization. It has two halves:- Active members — people who have accepted an invitation and signed in
- Pending invitations — invites sent but not yet accepted (with their expiry date)
Roles
Every active member has a role that determines what they can do across the console.| Role | What they can do |
|---|---|
admin | Everything. Manage members, API keys, namespaces, ontologies, plugins, integrators, billing. Required for all mutations on org-level resources. |
member | Default for new invitees. Access the console and any namespace they’ve been granted. Cannot manage org-level resources. |
namespace_member | Most restricted. Access only specific namespaces via grants. Useful for external collaborators or per-team scoping. |
integrator | Special role for external system integrations. Created through a separate invite endpoint, not the regular member invitation flow. |
member with no grants sees nothing namespace-specific; a member granted read access on ns_a sees that namespace.
Inviting
Click Invite and provide an email address and role. The invitee receives a sign-in email and creates an account on first sign-in. Pending invitations expire after the WorkOS-configured TTL.Inviting an
integrator from this UI is rejected by the API. Use the integrator invite endpoint (separate flow) for external integration accounts.Changing roles
An admin can change another member’s role from the kebab menu. The change is applied immediately and audited.Removing
Click Remove to revoke access immediately. The user keeps their personal account but loses access to anything in your org, including any namespace grants.Ontology
An ontology is the schema your extractor uses duringremember — the entity types it should look for and the relationship types it should connect them with. Defaults are general-purpose (PERSON, ORGANIZATION, CONCEPT, LOCATION); domain work usually wants more specific types.
Creating an ontology
| Field | Required | What |
|---|---|---|
| Name | Yes | 1–200 characters. Surfaces in the namespace detail view when picking which ontology to apply. |
| Description | No | Free-form, for your team’s reference. |
| Default for org | No | Mark as the org-wide default. Only one ontology can be the default at a time; setting this on a new ontology unsets the previous one. |
| Entity types | No | A list of { name, description }. Add as many as you need. |
| Relationship types | No | Same shape — { name, description } per relationship. |
Editing an ontology
The detail view supports adding, renaming, and deleting entity types and relationship types after creation. Each change is audited. Renaming a type does not rewrite past extractions — only memories ingested after the change pick up the new name.Picking which ontology runs
Three places you can set this:- Org default — the ontology marked
is_default. Used by every namespace unless overridden. - Namespace default — set per-namespace from the namespace detail view. Overrides the org default for that namespace.
- Per-call override — pass
ontology_idon aremembercall to pin extraction for that specific document.
Deleting
Delete an unused ontology from the kebab menu. You cannot delete the org default — promote another ontology first.Plugins
Plugins are inbound webhook receivers — they let an external service push events to Deyta Platform. The current supported provider isworkos, used to receive WorkOS directory-sync and user-management events so changes in your IdP propagate into the console automatically.
When you create a plugin, Deyta Platform issues you:
- A webhook URL unique to your org (a long, random path on
api.deyta.ai). You configure the upstream provider to POST events to this URL. - A signing secret that you also configure on the upstream provider. Deyta Platform validates each incoming webhook against this secret to confirm it really came from your provider.
| Field | What |
|---|---|
| Display name | Friendly label, optional |
| Webhook secret | The signing secret (paste from your provider’s webhook config) |
| Provider | Currently always workos |
| Status | active (receiving events), inactive (paused), or error (recent deliveries failing) |
Event history
Each plugin has a paginated events view showing every webhook the upstream provider has delivered. Useful for verifying delivery, diagnosing signature mismatches, and replaying events during integration work. Events show:- External event ID (from the provider)
- Event type
- Status (received, processed, failed)
- Error message if processing failed
- Received and processed timestamps
Limits
One plugin per provider per org. Today this means oneworkos plugin — additional providers will land as new plugin types. Toggling a plugin to inactive stops processing without deleting its history; deleting the plugin removes both the receiver and the event history.
Integrators
Integrators are the data-source providers your org has enabled for use in integrations. Common providers: Google Drive, Snowflake, object stores. For each provider you can:- Enable / disable at the org level — disabled providers are hidden from the integrations UI and
startcalls return403 - Configure provider-specific credentials if the integration uses an org-wide service account rather than per-user OAuth
Audit log
Every state-changing action in the console and the API writes an entry to the audit log. Filter by:- Time range
- Actor (user email or API key)
- Action (
namespace.created,memory.remembered,data_source_connection.connected, etc.) - Entity type / ID
Domains
If your organization uses email-domain-restricted SSO, configure the allowed domains here. Users signing in with an email outside the allowlist are denied access to your org. This is independent of WorkOS-level SSO configuration; it’s an extra check applied by Console at sign-in.What’s next
Authentication
API keys, permissions, identities, and scopes.
Namespaces
Create and manage the tenancy boundary for memories.