SerenQuantDocs
Sign up
Sign up
© 2026 SerenQuant. All rights reserved.
DocsPrivacyTermsStatusSupport
Docs
Documentation
Start here
Overview
Guide library
GuidesGetting Started: APIGetting Started: MCPAuth + Workspace ScopesAccount and Workspace ManagementMarkets WorkspaceMarkets Symbol WorkspaceMarket Guides and Beta ScopeFutures ReadinessResearch WorkflowResearch Workbench, Pipeline, and ExperimentsResearch Specialist MethodsResearch Context SurfacesBacktests Run LifecycleBacktests Run Detail and CompareStrategy Sweeps and OptimizerExecution WorkflowProviders and BenchmarkingSettings and Runtime ConfigAgent WorkbenchNews WorkflowDatasets WorkflowGlobal Language SelectionMFA Getting StartedMFA Recovery + Device LossMFA Trusted DevicesMFA API ReferenceLLM Market Analysis LoopStrategy Generation + Backtest LoopPromotion + Risk Guardrails
Reference
API ReferenceMCP Reference
Lifecycle
Changelog
  1. Docs/
  2. Guides/
  3. Settings and Runtime Config
Public docs

Guide: Settings and Runtime Config

Review workspace posture, token security, policy controls, runtime config, and agent-profile management in the signed-in settings surface.

Signed-in workflow

What this guide covers

Use this guide when you need to understand how system posture, auth tokens, policy controls, and runtime or agent settings work together inside the workspace settings page.

  • Start with the posture hero and status overview so you understand health, auth mode, provider-key posture, and hard-block policy state.
  • Treat token security, onboarding, and policy cards as the operational center of settings rather than isolated forms.
  • Use runtime config and agent profiles carefully because they influence research, automation, and execution behavior downstream.

Routes and surfaces

These settings surfaces currently shape how a workspace controls policy, runtime behavior, and operator readiness.

/settings · posture hero

Posture hero

Review the backplane, missing provider keys, auth mode, and hard-block posture before making changes.

/settings · status & token security

Status and token security

Use the status overview and token-security card to inspect health, config, token issuance, and active auth context.

/settings · workspace onboarding

Workspace first steps

Set the preferred start route and default goal preserved by startup.

/settings · quant, data, news, UI policy cards

Policy cards

Tune quant, data, news, and UI preferences including research mode and enforcement posture.

/settings · runtime config & agent profiles

Runtime and agent profiles

Control LLM runtime settings, runtime audit, and agent-profile state that shape downstream automation behavior.

/settings · side rail posture summary

Side-rail posture summary

Keep a compact posture summary visible while reviewing deeper controls and change risk.

Recommended configuration loop

Use this sequence so settings changes stay deliberate and observable.

01

Check posture before editing

Start with health, auth mode, provider-key status, and block-or-warn posture before changing any setting.

02

Secure the auth and token path

Review token issuance, active token state, and workspace onboarding before you assume a workflow can authenticate safely.

03

Adjust policies deliberately

Change quant, data, news, and UI policy values only after you understand how they affect research and production behavior.

04

Tune runtime and agent behavior

Use runtime config and agent-profile controls as the last step so the broader posture and policy baseline is already set.

Status, token, and onboarding controls

These controls tell you whether the workspace is safe to operate before you touch deeper policy or runtime settings.

health state

Status overview and expanded config

Use the status overview to inspect health, config, and workspace identifiers before you assume a settings issue is local to one card.

token lifecycle

Token issuance, rotation, and active token use

The token-security card is where issuance, rotation, revoke, and active-token switching happen. Treat it as both a security surface and a workflow prerequisite.

workspace bootstrap

Preferred start route and default goal

Keep the onboarding card aligned with the team's actual operating path so new sessions land in the right place.

compact posture

Side-rail posture signals

Use the side rail as a compact risk summary while editing. It keeps auth mode, missing provider keys, and gate posture visible without leaving the form.

Policy, runtime, and agent-profile controls

The lower settings cards are where workspace posture turns into actual runtime behavior.

policy stack

Quant, data, news, and UI policy cards

These cards control research mode, enforcement posture, and quality thresholds. Review them together because production behavior reflects the whole stack, not one toggle.

runtime audit

LLM runtime config and audit state

Treat runtime config alongside its audit trail so model or provider changes remain explainable after rollout.

profile library

Create, clone, and review agent profiles

Agent profiles define downstream automation behavior. Use create and clone actions to evolve them deliberately instead of mutating the only live profile.

profile activation

Activation and selected-profile flow

Keep the selected profile, status, and activation history aligned so the workspace knows which agent behavior is currently authoritative.

Example change scenarios

Use these scenarios when a settings change needs a concrete operating loop instead of only abstract control descriptions.

token hygiene

Rotate an active workspace token without breaking downstream tools

Start in the status and token card, issue the replacement token, confirm the side-rail posture stays healthy, then switch the active token only after the new credential is visible where your tools consume it.

Expected outcome

The workspace ends with one clearly active token, the old token revoked or sidelined, and no silent auth drift across agents or automation.

policy rollout

Tighten a noisy news or data policy after a bad workflow week

Review posture and recent runtime audit first, then move the relevant policy card from warn mode into a stricter threshold or block posture and re-check the downstream workflows that depended on the old tolerance.

Expected outcome

The change is tied to an explicit policy reason, and you know which workflows will now fail fast instead of quietly degrading.

runtime promotion

Promote a new agent profile into workspace default

Clone the current profile, apply the runtime or profile edits on the draft, review activation history, and only then activate the new profile once related delivery and automation assumptions still look valid.

Expected outcome

A new profile becomes authoritative with preserved change history and a clear rollback path to the prior profile.

Change-control reminders

  • Do not change runtime or agent behavior without checking whether the broader posture is already degraded.
  • Treat token issuance and active-token use as security events, not only convenience actions.
  • Keep block-vs-warn policy changes explicit because they alter how research, data, and production flows fail.
  • Review runtime and agent audit trails after major settings changes so downstream behavior stays explainable.

Next steps

Open Settings

Jump into the signed-in settings page and inspect posture, policy controls, and runtime behavior.

Providers guide

Review the provider surface if missing keys, route policy, or capability posture is part of the change.

Execution guide

See how settings posture flows into live, paper, operations, and portfolio execution behavior.

Last updated

Mar 24, 2026

Feedback

Report unclear guidance, stale contracts, missing coverage, or broken docs UI on this page.

Open feedback issue
Previous
Providers and Benchmarking
Next
Agent Workbench
On this page

Jump to the section you need without losing your place.

  • What this guide covers
  • Routes and surfaces
  • Recommended configuration loop
  • Status, token, and onboarding controls
  • Policy, runtime, and agent-profile controls
  • Example change scenarios
  • Change-control reminders
  • Next steps
Last updated

Mar 24, 2026

Feedback

Report unclear guidance, stale contracts, missing coverage, or broken docs UI on this page.

Open feedback issue