Enterprise
The Enterprise edition of the Radicalbit AI Gateway is designed for organizations that need to operate AI infrastructure at scale, with strong governance, security controls, and integration into existing identity systems.
It includes everything in the standard edition, plus the following capabilities.
Access Control
Enterprise deployments can integrate the gateway with an existing Identity Provider (IDP) to centralize user and group management. Rather than managing gateway users manually, your organization's existing identity infrastructure is used as the source of truth.
Key capabilities:
- IDP Integration — currently supports Keycloak, with additional providers available on request. Users and groups are automatically synchronized from the IDP into the gateway on a configurable schedule.
- Role-Based Access Control — three built-in roles with granular permissions:
- ADMIN — full access: manage users, groups, API keys, projects, and serve configurations
- BUILDER — configure projects and mark configurations as ready to serve
- AUDITOR — read-only access to dashboards, tracing, and metrics
- OIDC Single Sign-On — the gateway admin interface supports SSO via standard OpenID Connect, so users log in with their existing organizational credentials
- JWT Token Authentication — users can call gateway API endpoints directly using IDP-issued JWT tokens, without needing separately managed gateway API keys
See Access Control for configuration details.
Secrets Management
In production environments, API keys and other sensitive credentials should not live inside configuration files. The gateway supports pluggable secrets backends that resolve !secret KEY references at startup from a secure external store.
Supported providers:
- AWS Secrets Manager — secrets stored as a single JSON object
- HashiCorp Vault — key-value pairs under a configurable path, with token or AppRole authentication
- Google Cloud Secret Manager — individual secrets per key, with label-based filtering
- Azure Key Vault — individual secrets per key, with optional prefix filtering
When a secrets plugin is enabled, no secrets.yaml file is needed — the plugin replaces it transparently. Your config.yaml remains unchanged.
Custom secrets providers can also be implemented as plugins. See Secrets Management for details.
Licensing
For licensing inquiries and enterprise agreements: sales@radicalbit.ai