Security features and best practices for protecting your LLM trace data
Role | View Traces | Configure Routing | Manage Keys | Access PII |
---|---|---|---|---|
Admin | ✅ | ✅ | ✅ | ✅ |
Developer | ✅ | ✅ | ❌ | ❌ |
Analyst | ✅ | ❌ | ❌ | ❌ |
Viewer | ✅ (redacted) | ❌ | ❌ | ❌ |
Data Minimization
Purpose Limitation
Data Subject Rights
Security Measures