- One namespace per end user — you build a personal-memory product
- One namespace per project or workspace — you build a team product
- One namespace per data source — you keep ingested content from different sources separate
- A small fixed set — you build an internal tool with a handful of long-lived stores
Creating a namespace
Open Namespaces in the console sidebar and click Create namespace. You’ll be asked for:| Field | Purpose |
|---|---|
| Name | Human-readable label. Shown across the console; not a unique identifier. |
| Description | Optional, for your team’s reference. |
| External reference ID | Optional. Your own ID for this namespace — useful when Deyta Platform should be addressable by your user/project ID rather than the Deyta Platform-generated ns_…. |
Listing and finding
The namespaces page is the index. From there you can:- Search by name or description
- Group by scope value, by recent activity, or none
- Filter by scope, if your org uses scopes
Detail view
Clicking into a namespace shows you:- Stats — document count, chunk count, entity/relationship count, last activity
- Recent activity — the last few
remember/recall/forgetevents - Ingestion jobs — if any data sources are connected, the most recent sync runs
- Permissions — which users and API keys have access
- MCP endpoint URL — for connecting an agent directly via Model Context Protocol
Permissions
Namespaces have dual grants: both users (people in your org) and API keys can be granted access. From the namespace detail page, open the permissions panel to:- Grant a user access (read-only or read/write)
- Grant or revoke an API key
- Remove a grant
External reference IDs
If you setexternal_reference_id on a namespace, every operation that takes a namespace can address it by that ID instead of the Deyta Platform ns_…:
Deleting a namespace
From the detail page, open the kebab menu and choose Delete. Deletion is permanent and removes:- All documents, chunks, entities, and relationships in the namespace
- All ingestion connections rooted in this namespace
- All permission grants for users and API keys
Auto-provisioning (for some orgs)
Some plans enable auto-provisioning — when an API key calls a memory operation with anexternal_reference_id that doesn’t exist yet, the namespace is created on the fly. If your org has this enabled, you’ll see a banner in the namespaces page; if not, every namespace must be created explicitly first.
What’s next
Authentication
API keys, permissions, and namespace grants.
Admin
Org-wide controls — members, ontology, integrations, audit log.