Review workspace posture, token security, policy controls, runtime config, and agent-profile management in the signed-in settings surface.
Use this guide when you need to understand how system posture, auth tokens, policy controls, and runtime or agent settings work together inside the workspace settings page.
These settings surfaces currently shape how a workspace controls policy, runtime behavior, and operator readiness.
Review the backplane, missing provider keys, auth mode, and hard-block posture before making changes.
Use the status overview and token-security card to inspect health, config, token issuance, and active auth context.
Set the preferred start route and default goal preserved by startup.
Tune quant, data, news, and UI preferences including research mode and enforcement posture.
Control LLM runtime settings, runtime audit, and agent-profile state that shape downstream automation behavior.
Keep a compact posture summary visible while reviewing deeper controls and change risk.
Use this sequence so settings changes stay deliberate and observable.
Start with health, auth mode, provider-key status, and block-or-warn posture before changing any setting.
Review token issuance, active token state, and workspace onboarding before you assume a workflow can authenticate safely.
Change quant, data, news, and UI policy values only after you understand how they affect research and production behavior.
Use runtime config and agent-profile controls as the last step so the broader posture and policy baseline is already set.
These controls tell you whether the workspace is safe to operate before you touch deeper policy or runtime settings.
Use the status overview to inspect health, config, and workspace identifiers before you assume a settings issue is local to one card.
The token-security card is where issuance, rotation, revoke, and active-token switching happen. Treat it as both a security surface and a workflow prerequisite.
Keep the onboarding card aligned with the team's actual operating path so new sessions land in the right place.
Use the side rail as a compact risk summary while editing. It keeps auth mode, missing provider keys, and gate posture visible without leaving the form.
The lower settings cards are where workspace posture turns into actual runtime behavior.
These cards control research mode, enforcement posture, and quality thresholds. Review them together because production behavior reflects the whole stack, not one toggle.
Treat runtime config alongside its audit trail so model or provider changes remain explainable after rollout.
Agent profiles define downstream automation behavior. Use create and clone actions to evolve them deliberately instead of mutating the only live profile.
Keep the selected profile, status, and activation history aligned so the workspace knows which agent behavior is currently authoritative.
Use these scenarios when a settings change needs a concrete operating loop instead of only abstract control descriptions.
Start in the status and token card, issue the replacement token, confirm the side-rail posture stays healthy, then switch the active token only after the new credential is visible where your tools consume it.
The workspace ends with one clearly active token, the old token revoked or sidelined, and no silent auth drift across agents or automation.
Review posture and recent runtime audit first, then move the relevant policy card from warn mode into a stricter threshold or block posture and re-check the downstream workflows that depended on the old tolerance.
The change is tied to an explicit policy reason, and you know which workflows will now fail fast instead of quietly degrading.
Clone the current profile, apply the runtime or profile edits on the draft, review activation history, and only then activate the new profile once related delivery and automation assumptions still look valid.
A new profile becomes authoritative with preserved change history and a clear rollback path to the prior profile.
Jump into the signed-in settings page and inspect posture, policy controls, and runtime behavior.
Review the provider surface if missing keys, route policy, or capability posture is part of the change.
See how settings posture flows into live, paper, operations, and portfolio execution behavior.
Mar 24, 2026
Report unclear guidance, stale contracts, missing coverage, or broken docs UI on this page.
Open feedback issueJump to the section you need without losing your place.
Mar 24, 2026
Report unclear guidance, stale contracts, missing coverage, or broken docs UI on this page.
Open feedback issue