Peridot
  • Peridot Home
  • Blog
  • Github
  • Home
  • App Building Guide
  • Peridot Home
  • Blog
  • Github
  • Getting Started
    • Peridot Documentation
    • Introduction to Peridot
    • How Peridot Works
    • Core Concepts
    • Quick Start Guide
  • Builder Guide
    • AI Inventory Overview
    • Discovering AI Tools
    • Tracking AI-Generated Applications
    • Data Classification
    • Data Flows Overview
    • Monitoring AI Data Movement
    • Shadow vs Sanctioned AI
    • Policies Overview
    • Policy-Based Routing
    • Policies & Enforcement
    • Enforcement Actions
    • Incidents Overview
    • AI Incident Playbooks
    • Actions and Automation
    • Backend APIs
  • Admin Guide
    • Admin Guide Overview
    • Model Providers Overview
    • Roles & Permissions
    • Audit Logs
  • Enterprise Deployment & Security
    • Compliance and Security Overview
    • Control Plane vs Data Plane
    • Deployment Architecture
    • Deployment Environments
    • BYOK (Bring Your Own Key)
    • Data Handling and Privacy
  1. Overview
  2. Admin Guide

Admin Guide

  • Admin Guide Overview

    OverviewThe Admin Guide provides centralized control over access, governance, and system configuration in Peridot.It is designed for teams responsible for securing AI usage across an organization, including cloud infrastructure engineers, security teams, ...

  • Model Providers Overview

    OverviewPeridot supports multiple AI model providers and enables centralized control over how models are accessed, routed, and governed.This allows organizations to use different models for different purposes while maintaining consistent policy enforcemen ...

  • Roles & Permissions

    OverviewRoles and permissions in Peridot define who can access systems, view data, and enforce governance policies across your organization.They are the foundation of secure operation and ensure that control over AI systems is restricted, auditable, and a ...

  • Audit Logs

    OverviewAudit logs provide a complete, immutable record of all activity within Peridot.They are critical for governance, compliance, and incident investigation.What Is LoggedPeridot captures:User actionsPolicy evaluations and enforcementData access and mo ...

© Copyright 2026 Peridot.
  • Privacy Policy
  • Terms of Service
  • Contact