Security
Sentinel centralizes model access, which makes it part of your security posture. It gives teams a safer control point for authentication, provider credential handling, policy enforcement, and evidence around request behavior.
What Sentinel secures
Sentinel secures the model-access layer by centralizing:
- client authentication to the gateway
- provider credential isolation from application clients
- policy and endpoint restriction enforcement before provider execution
- durable request and operator evidence through telemetry and audit
The goal is to move model-access control into one managed layer instead of scattering it across individual applications.
Trust boundaries
Sentinel sits between:
- applications and end-user workflows
- provider credentials and provider APIs
- operator control surfaces and runtime traffic
That makes the trust boundaries explicit:
- clients trust Sentinel keys, not provider keys
- operators manage provider secrets through the control plane
- the gateway enforces policies and restrictions before provider execution
This separation helps teams control model access without distributing sensitive provider credentials across clients.
Client auth versus provider auth
Clients authenticate to Sentinel. Sentinel then authenticates to providers on their behalf.
That separation is one of the core security properties of the platform.
In practice:
- application clients should not need direct provider credentials
- provider secrets should remain under operator control
- SDK-specific auth quirks should be handled in the client configuration layer, not by exposing provider credentials to callers
Security priorities
For most teams, the first priorities are:
- encrypting and isolating provider secrets
- scoping Sentinel keys narrowly
- keeping production and non-production environments separate
- retaining enough audit evidence for governance and incident review
- validating route and endpoint restrictions as part of rollout
These controls matter because model access is both a runtime path and a governance surface.
What Sentinel is not
Sentinel strengthens model-access governance, but it does not replace:
- your application authorization model
- upstream provider account hygiene
- network perimeter or service identity controls
- data classification policies inside your own applications
Sentinel adds a security layer around model access. It does not replace the rest of your application or enterprise security model.
Recommended enterprise controls
To operationalize Sentinel securely:
- rotate keys regularly
- use separate provider configs for different environments
- review audit and telemetry access permissions
- document which teams own budgets, policy changes, and provider credential changes
- define retention expectations for audit and request visibility explicitly
The goal is to make control ownership, evidence, and environment separation clear before Sentinel becomes part of critical workloads.