Adding your keys.
Where to paste them. How they are stored. How they are rotated.
In the app
Workspace → Settings → Providers. Paste the key. We validate it with a no-op call to the provider's lightest endpoint. If validation fails the key is not stored.
How keys are stored
Per-workspace envelope encryption. Each workspace has a data encryption key wrapped by a key encryption key held in our KMS. Engineers cannot read your keys; the database row is ciphertext. The key never leaves our backend at request time except in the outbound HTTPS call to the provider you authorized. Full architecture in data residency & retention.
Rotation
Click rotate. We re-validate with the new key, swap the encrypted blob, and zeroize the old one. The old ciphertext is unrecoverable after rotation.
Through the API
curl -X POST https://api.paitho.ai/v1/providers/anthropic \
-H "Authorization: Bearer $PAITHO_TOKEN" \
-H "Content-Type: application/json" \
-d '{"key": "sk-ant-..."}'
The endpoint returns a provider_id you can reference in routing rules. Routing & fallbacks.