Page cover

User Access Management

circle-info

Note on Terminology In this section, the term model is used as a generic reference to a deployed workload. For customers providing TFHE-based programs or other non-model workloads, model should be interpreted as workload. User access controls, permissions, and enforcement logic remain the same.

Token-Based Access

Access to AI models is granted through User Access Tokens, which are:

Model-Specific: Each token is tied to a single AI model and cannot be used with other models.

User-Specific: A token grants access to one user only.


User Access Management Flow

  1. Create User Access Tokens

    AI Providers initiate the creation of tokens, specifying the model the token will access.

    circle-info

    Tokens can be created without being assigned to a specific model initially. These tokens can later be assigned to a model as needed.

  2. Assign Tokens Assign a token to a specific AI model to enable secure access.

  3. Reassign Tokens

    Reassignment requires two actions: first, remove the current assignment to make the token unassigned, and then assign it to the new model.

  4. Update Token Attributes

    AI Providers can update attributes such as token description or status (active/cancelled).

  5. View Token Details

    AI providers can view a token’s full definition, including its assigned model, status, and expiration date.


For detailed steps, refer to the following pages:


Last updated