Documentation Index
Fetch the complete documentation index at: https://docs.alterauth.com/llms.txt
Use this file to discover all available pages before exploring further.
How Alter Vault Works
Alter Vault is the credential and authorization layer for AI agents that serve multiple users across multiple services. It stores OAuth tokens and API credentials in an encrypted vault, enforces identity-aware policies on every access, and logs every action with full actor context.Two Paths, One API
Alter Vault supports two types of credentials, both accessed through the samevault.request() method:
- OAuth Connections — for third-party services where users authorize access (Google, Slack, GitHub)
- Managed Secrets — for internal APIs where credentials are already available (API keys, service tokens)
Zero Credential Exposure
Application code never sees or stores credentials. Here is what happens instead:Connect or Store
OAuth: User authorizes through Alter Connect UI. Managed Secrets: Developer stores credentials via the Developer Portal.
Security
Encryption
- AES-256-GCM encryption for all stored tokens
- TLS 1.3 for all data in transit
- Hardware security modules for key management
Access Control
- API key authentication for backend services
- Session tokens for frontend (never expose API keys)
- Built-in policies — time-based access, IP allowlist, connection TTL
- Custom policies — URL restrictions, HTTP method restrictions, rate limiting, and rules tied to user or actor identity. See Security Policies.
- Fail-closed design — if the policy service is unavailable, all token access is denied
Compliance
- SOC 2 Type II certified
- HIPAA compliant infrastructure
- GDPR compliant with data residency options
- PCI DSS Level 1 for payment integrations
Grant ID: The Universal Handle
Every credential in Alter Vault has a uniquegrant_id (UUID). Usage is identical via vault.request() regardless of credential type. The key difference is where the grant_id comes from:
| Credential Type | Where grant_id Comes From | Who Creates It |
|---|---|---|
| OAuth | onSuccess callback when end user completes OAuth via Alter Connect | End user (by logging into Google, Slack, etc.) |
| Managed Secret | Developer Portal when storing a credential | Developer (via portal UI) |
OAuth grants are per-user — each end user who authorizes gets their own
grant_id. Managed secrets are per-service — one credential is stored and all backend code shares the same grant_id.Connection Deduplication
Alter Vault automatically prevents duplicate OAuth grants for the same account. When a user re-authorizes, the existing connection is updated instead of creating a duplicate.- Search by the OAuth account identifier (email, sub, or ID from the provider)
- If found, update the existing connection with fresh tokens
- If not found, create a new connection and return the new
grant_id
If a user re-authorizes with the same OAuth account, the existing connection is updated. The
grant_id remains the same.Custom Schemas
Add structured data to any OAuth connection:- Sync settings - Which data to sync, how often
- User preferences - Per-connection configuration
- Metadata - Labels, tags, categories
- Mapping - Link to internal records
Audit Logs
All activity is logged automatically, including token access, connection changes, API calls, and admin actions. View, filter, and export logs from the Developer Portal. AI agents are tracked with full context (actor name, run ID, thread ID). See the Audit Logs guide for details on viewing and exporting logs.Performance
Token Retrieval
Less than 10ms for cached tokens
Availability
99.99% uptime SLA
Scale
Millions of tokens/day
Credential Management
Alter Vault handles the entire credential lifecycle:Automatic
- ✅ Store credentials securely — Encrypted at rest (AES-256-GCM)
- ✅ Refresh OAuth tokens before expiry — No failed API calls
- ✅ Inject the right header — Bearer, API Key, Basic Auth — automatic
- ✅ Enforce policies — Time-based and IP restrictions on every access
- ✅ Retry on failure — Automatic error recovery
- ✅ Audit all access — Complete compliance trail for both OAuth and managed secrets
Eliminated
- ❌ Store tokens or API keys in the application database
- ❌ Implement refresh logic
- ❌ Construct auth headers manually
- ❌ Manage encryption keys
- ❌ Build retry mechanisms
Architecture Benefits
Reduced Security Risk
Reduced Security Risk
Tokens are never handled directly by application code, eliminating the risk of token leaks, database breaches, or accidental exposure in logs.
Simplified Compliance
Simplified Compliance
Alter Vault carries SOC 2 and HIPAA certifications, reducing the compliance burden for applications built on top of it.
Provider Agnostic
Provider Agnostic
One integration with Alter Vault provides access to 100+ OAuth providers without learning each API.
Maintenance Free
Maintenance Free
When Google changes their OAuth flow or Slack updates their API, Alter Vault handles it. Application code does not change.
Integration Example
The complete flow in practice:1. Frontend: User Connects (OAuth)
2. Backend: Use the Connection
Getting Started
Quick Start
Connect a first integration in 5 minutes
Audit Logs
Compliance and observability
Developer Portal
Configure OAuth providers