Store and manage provider credentials in one logged-in surface.
The page prioritizes the providers most teams start with.
Provider credentials are handled separately from platform API keys.
Use platform keys for Versalist auth, not for model-provider access.
Foundation-model providers
The integrations page is organized around the providers you are most likely to route inference through. The goal is not to store every possible credential you own. It is to connect the providers that are actually part of your Versalist workflow.
How to add a provider key
The integrations route is meant to stay operational and explicit. Add the key, confirm the provider is enabled, and then leave the page unless your routing or credentials need to change.
Integration depth
Provider support should be read as an operational contract, not a badge. Today, the live product surface is BYOK inference for configured providers. Custom endpoints and compute runtime adapters are roadmap work described in RFCs, not production support claims.
Related external systems
Some integrations are about inference providers. Others are about the systems your work already lives in. Keep those roles separate so the page remains understandable.
Operational guidance
Integrations should help you keep control of routing and credentials, not turn into a hidden source of cost drift or auth confusion. Treat the page as a routing contract.
Troubleshooting
Integration problems usually come from one of three places: the wrong provider was enabled, the credential is stale, or the user is actually looking at the wrong auth layer entirely.