Console sign-in
You sign in to the console through WorkOS — single sign-on, password, or magic link, depending on what your organization has enabled.First time
Go to console.deyta.ai and sign in. New users land on a guided onboarding that creates the organization automatically.
API keys
Applications authenticate against the gateway API with a Bearer token.Generate a key
In the console, open API Keys from the sidebar and click Generate Key. Give the key a recognizable name. The secret is shown only once — copy it immediately and store it as a secret in your application’s environment.Rotate a key
Generate a new key, deploy your application with the new value, and then revoke the old one from the console. There is no in-place rotation — it’s a swap.Revoke a key
Open API Keys, find the key, and revoke it. All requests using that key start failing with401 UNAUTHORIZED immediately.
Permissions
Each API key carries a set of gateway permissions that gate what it can do. The most common ones:| Permission | Allows |
|---|---|
NAMESPACE_READ | recall, ask, list namespaces, get namespace by ID |
NAMESPACE_WRITE | remember, forget |
NAMESPACE_MANAGE | Create, delete, and grant access to namespaces |
INTEGRATION_MANAGE | List providers, start/complete/delete connections |
NAMESPACE_WRITE.
Namespace grants
API keys are also granted to specific namespaces. Even withNAMESPACE_READ, a key can only see namespaces it’s been granted access to.
Two ways a key gets a namespace grant:
- Implicit — when an API key creates a namespace via the gateway, it’s automatically granted to that namespace.
- Explicit — an admin grants access from the namespace’s permissions panel in the console.
Scopes (advanced)
Beyond namespace-level grants, API keys can be scoped to filter what content they see within a namespace. Scopes are key-value attributes attached to memories and to API keys; a key with the scopeteam=engineering will only see chunks tagged with that scope.
Scopes are managed from the Scopes sidebar entry in the console. Most applications don’t need them — start without scopes and add them only when you need stricter isolation than namespace-level provides.
Identities (advanced)
If your application acts on behalf of an end user (e.g., personalizing memories per customer), use Identities to attach a stable user ID to every operation. The console’s Identities panel shows recent activity per identity for debugging and auditing. Identities are independent of API keys — one key can act as many identities by passing the identity ID on each request.What’s next
Namespaces
Create and manage namespaces — the tenancy boundary for memories.
API Reference
Every gateway endpoint, with auth requirements documented per operation.