In April, Palo Alto Networks announced its intent to acquire Portkey to secure the rise of AI agentsâestablishing the AI Gateway as a mission-critical control plane for autonomous workloads, with Portkey planned as the AI Gateway for Prisma AIRS. April also puts Agent Gateway front and center: you get CRUD APIs for agent integrations and agent servers, skills, workspace- and user-level access, and RBACâso agent connectivity is governed with the same discipline as models and keys. Weâve also rolled out upgrades across the gateway, guardrails, permissions, provider ecosystem, and deployment pathsâgiving teams more control and clearer enterprise workflows.Documentation Index
Fetch the complete documentation index at: https://docs.portkey.ai/docs/llms.txt
Use this file to discover all available pages before exploring further.
Summary
| Area | Key highlights |
|---|---|
| Agent Gateway | ⢠CRUD APIs for agent integrations and agent servers ⢠Skills ⢠Workspace- and user-level access ⢠RBAC |
| Platform | ⢠API key rotation (scheduled, manual, usage reset) ⢠Organization session policy ( max_session_ttl) |
| Gateway | ⢠Local JWT validation ⢠HEADERS_TO_METADATA ⢠Weekly windows (rpw) and endpoint-scoped limits ⢠Passthrough targets ⢠Sticky routing ( strategy.sticky) ⢠Forward-headers mapping ⢠allow_subdomain |
| Guardrails | ⢠Streaming output checks ⢠Required metadata key-value pairs ⢠Lasso v3 ⢠Model Rules and request-params checks ⢠Guardrail and org-admin log permissions ⢠Semantic cache setup ⢠Partner guardrails |
| Models and providers | ⢠Anthropic Files API and batch ⢠service_tier speed mapping ⢠Rerank ⢠Gemini embeddings (incl. 2-preview) ⢠HEIC/HEIF multimodal ⢠Mistral response_format |
| Integrations | ⢠Claude Cowork, Hermes, Pi ⢠Slack MCP ⢠Retool ⢠Conductor ⢠MCP Skills Registry naming ⢠Metadata patterns for common use cases |
| Deployment | ⢠Self-hosted image and provisioning updates (GCP, AWS, Azure) ⢠Azure Container Apps refresh |
Agent Gateway
The control plane now includes Agent Gateway: manage agent integrations and agent servers through CRUD APIs, attach skills, and enforce workspace- and user-level access with RBACâwithout treating agents as a side channel next to your LLM keys. Learn more: Agent GatewayPlatform & control plane
API key rotation and usage reset
You can rotate Portkey API keys on a schedule or on demand: set automatic rotation (weekly or monthly), call the manual rotate endpoint when you need an immediate roll, and reset usage alongside rotation so spend and limit counters line up with the key that is actually in use.Organization session management
Organizations can enforce session management at the org level (for examplemax_session_ttl) so idle sessions expire on a policy you control.
Gateway-local JWT authentication
The gateway can validate JWTs locally without a control-plane round trip, further lowering auth latency for self-hosted deployments. SetJWT_ENABLED=ON.
Headers-to-metadata injection
HEADERS_TO_METADATA copies selected inbound headers into request metadata so traces and analytics pick up caller identity, trace IDs, or environment tagsâwithout clients sending x-portkey-metadata everywhere.
Weekly and endpoint-scoped rate limits
Rate and budget policies can use weekly windows (rpw) so caps line up with how teams review spend week over weekânot only minute-by-hour aggregates.
You can also scope limits by endpoint type (for example chat completions vs embeddings), so one global rule is not doing all the work.
Learn more: Budget & rate limit policies
Configs: passthrough, sticky sessions, forward headers, and subdomains
Configs: pick up routing controls like passthrough targets, sticky sessions, header forwarding, and subdomain rules, so you can steer traffic in one place instead of juggling a separate JSON-only workflow.- Passthrough targets: send the request down a direct path to the upstream you name, when you do not want the gateway to rewrite that hop.
- Sticky sessions: (
strategy.sticky) pin related traffic to the same target so follow-up calls stay on one backend or model instance. - Forward headers: (
forward_headers) copy or rename inbound headers on the way outâuseful for provider-specific headers, tracing IDs, or tenant markers. - Allow subdomain: (
allow_subdomain) lets routing respect subdomain variants of your gateway host when hostname or tenant routing depends on it.
Guardrails
Output guardrails for streaming responses
Your output guardrails can run on streamed answers, too. End users still see the usual token-by-token stream. When the assistant message finishes, Portkey runs your checks once and adds a single final chunk on the same stream with the outcome, so you learn pass/fail without opening another request. Learn more: GuardrailsRequired metadata keyâvalue pairs
Require specific metadata on every LLM requestâfor example a tenant or workspace label, so routing, observability, and downstream rules always see the context they expect. Requests that omit or mismatch those keyâvalue pairs are rejected before Portkey forwards traffic to the model. Learn more: GuardrailsLasso Security: v3 API
Lasso in Portkey now runs on the v3 Classify API, so each check returns structured findings you can act onâwhat was flagged, how serious it is, and the recommended response (for example block, auto-mask, or warn) instead of digging through opaque responses.- Tie detections to sessions and users with
sessionIdanduserIdso security and platform teams can follow a conversation or actor across calls. - Use one integration across chat completions, Anthropic-style
/messages, completions, and embeddings without splitting configs by endpoint type. - If you host Lasso yourself, set optional
apiEndpointso Portkey calls your deployment.
Model Rules and request-params check
Model Rules let you tie âwho may call which modelâ to request metadata. You get predictable allow/deny behavior instead of ad hoc checks in every client. Request parameters check lets you govern tools and parameters before traffic leaves Portkeyâfor example block risky tools, cap token limits, or require safe defaults. Learn more: Guardrail checksGuardrail access and org-admin logs
Fine-grained permissions now separate who can define guardrails from who can run them, and clarify who can open full request logs at the org level. That gives you least privilege and cleaner handoffs for security & compliance. Learn more: Access control ¡ Logs access in workspacesPartner guardrails
Partner guardrails adds a step-by-step pattern in Portkey for building guardrails as a partner integration, consistent with how built-in guardrails work.Semantic caching setup
Semantic cache setup is now guided in the Portkey appâyou get a clearer step-by-step path, in-product checks to confirm the policy behaves as expected, and less reliance on hand-tuned config alone before you roll the same settings out broadly. Learn more: Semantic cachingModels and providers
Anthropic Files API and batch: You can now run Anthropic Files API and batch workloads through Portkey alongside chat. Sendservice_tier so Portkey maps your call to the right speed / priority tier for predictable latency handling.
Rerank: You can now call rerank on the same Portkey path as chat and embeddingsâshared keys, routing, budgets, and observability.
Gemini embeddings: You can now route Gemini embedding models through Portkeyâincluding 2-previewâclass model IDsâwith the same OpenAI-compatible embedding request shapes you use elsewhere.
HEIC / HEIF multimodal: You can now send image/heic and image/heif in multimodal requests, and the Inline Image URLs guardrail can fetch and inline those formats like other images.
Mistral structured outputs: You can now pass response_format for structured JSON (including strict schema) to Mistral and have it honored through the gatewayâPortkey no longer drops the field on the path to Mistral.
Integrations
Claude Cowork, Hermes Agent, Pi: You can now connect these agents through dedicated Portkey flows with the same auth, routing, and governance as your other managed workloads. Slack MCP: You can now add Slack as an MCP server from Portkey and govern it like any other MCP connection. MCP Skills Registry: Portkey now surfaces Skills Registry instead of Agent Skills everywhere skills are named or discovered. Metadata patterns: New guidance covers common tagging and routing patterns with request metadata.Resources
- Blog: Who owns Claude Code at your company? A platform teamâs guide to managing coding agents at scale
- Blog: GitHub Copilot best practices for teams
- Blog: Cursor best practices for enterprise teams
- Blog: Moving Fast Has a Security Bill and It Just Came Due
Support
Need Help?
Open an issue on GitHub
Join Us
Get support in our Discord

