Provider access modes
Restormel Keys is a control layer (routing, policies, health, cost, UX). Your stack still needs a provider access layer to actually reach OpenAI/Anthropic/etc. This page explains the default modes and when to choose each.
Mode A — Gateway-backed (recommended)
You keep an external gateway/key host as the provider access layer. Restormel integrates cleanly and adds governance and progressive adoption.
- Examples: OpenRouter, Vercel AI Gateway, Portkey
- Where credentials live: In your gateway vendor account / your infra config
- What Restormel stores: Routing/policy config, integration metadata, references (not raw provider secrets by default)
- Why you’d pick it: Lowest migration risk; you keep existing auth/observability surfaces
Mode B — Builder-managed direct providers
Your backend calls providers directly using their SDKs or HTTP APIs. Provider credentials live in your env vars or secret manager. Restormel Resolve returns route/provider/model decisions and enforces policies in your control plane.
- Where credentials live: Your env vars / secret manager
- What Restormel stores: Routes, policies, health/analytics settings
- Why you’d pick it: You want no extra hop and already have mature secret management
Mode C — End-user BYOK (builder-managed)
If your product lets end-users bring credentials, you can expose a KeyManager UI and store end-user credentials in your backend (or a gateway-backed scheme). Restormel remains the control layer; it does not need to become the custodian.