Skip to main content

Key Concepts

Before diving into TraptureIQ's features, it's important to understand the core building blocks of the platform. This page explains each concept in plain language with examples.


1. The Tenant (Your Workspace)

What it is: A Tenant is your private, isolated workspace inside TraptureIQ. Think of it like a "team account" — everything you do (conversations, agent registrations, logs, user management) happens inside a Tenant.

Why it matters:

  • Complete isolation — No data (conversations, logs, traces, or users) is ever shared between Tenants. If your company has a "Sales Team" Tenant and an "Engineering Team" Tenant, they are completely separate.
  • Custom identity — Your Tenant has a unique name and URL slug (e.g., acme-corp) that identifies your workspace.

Example: Your company "Acme Corp" creates a Tenant called "Acme AI Ops" with the slug acme-ai-ops. All team members invited to this Tenant share the same agents, logs, and analytics — but cannot see data from any other Tenant.


2. The Agent

What it is: An Agent is an AI service (chatbot, assistant, workflow, etc.) that your team has built and deployed on your own infrastructure. TraptureIQ doesn't host your agent — it connects to it.

Why it matters:

  • External hosting — Your agents run on your own infrastructure (Google Cloud Run, Vertex AI, a custom server, etc.). TraptureIQ acts as the management layer on top.
  • Zero-code registration — You don't need to add SDKs, libraries, or any code changes to your agent. Simply provide the API URL and framework type.
  • Multi-framework support — Whether your agent is built with Google ADK, LangGraph, or CrewAI, TraptureIQ connects to it seamlessly.

TraptureIQ Platform

Example: You've built a customer support bot using LangGraph and deployed it on Cloud Run at https://my-support-bot-abc123.run.app. You register this URL in TraptureIQ, and your entire team can chat with it through a polished UI — with security, logging, and analytics built in.


3. Roles & Permissions

TraptureIQ uses Section-Level RBAC (Role-Based Access Control) with two roles:

Tenant Admin

The "power user" who manages everything. Tenant Admins can:

  • Register, edit, and deactivate agents
  • Invite and manage team members
  • Access all 13+ platform sections
  • Configure billing, security firewalls, and permissions
  • View analytics, costs, and audit trails

Tenant User

The standard role for everyday use. Tenant Users can:

  • Chat with agents they've been assigned
  • View their own conversation history
  • Access platform modules that an admin has enabled for them

How Access Control Works

Access is controlled at two levels:

LevelWhat It ControlsWho Configures It
Section-Level AccessWhich sidebar modules a user can see (e.g., Traces, Logs, Eval, Prompts)Tenant Admin toggles per user
Agent-Level AccessWhich specific agents a user can chat withTenant Admin toggles per user per agent

The 13 platform sections fall into three categories:

CategorySectionsVisibility
Admin-OnlyAdmin Dashboard, Analytics, Cost Control, AgentGuard, Access ManagementOnly Tenant Admins can see these
ConfigurableAgents, Traces, Logs, Eval, Sessions, Prompts, MCP DebugAdmins can enable/disable per user
Always AccessibleAnalyser, IntelligenceVisible to all users regardless of role

See the Roles guide for the full breakdown and comparison table.


4. Frameworks (How Your Agent Was Built)

A Framework tells TraptureIQ how to communicate with your agent. Each framework has its own API protocol, and TraptureIQ has built-in connectors for each:

FrameworkWhat It IsWhen to Choose It
Google ADKGoogle's Agent Development Kit for Vertex AI agentsYour agent was built using the ADK SDK and follows the ADK API spec
LangGraphLangChain's orchestration framework for stateful agentsYour agent uses LangGraph for multi-step reasoning workflows
CrewAIMulti-agent collaboration frameworkYour agent uses CrewAI for orchestrating teams of specialized agents

Why it matters: Choosing the correct framework ensures TraptureIQ sends requests in the format your agent expects and correctly parses the responses. If you select the wrong framework, the connection test will fail.


5. Deployment Types (Where Your Agent Runs)

The Deployment Type tells TraptureIQ where your agent is hosted:

Deployment TypeDescriptionAuthentication Required?
Agent EngineHosted on Vertex AI Agent Engine (Google-managed)Yes — requires one of three auth methods
Cloud RunA containerized agent deployed on Google Cloud RunNo — TraptureIQ connects directly over HTTPS
CustomAny other server (on-premises, another cloud provider, local dev machine)No — TraptureIQ connects directly over HTTPS

6. Authentication Methods (Connecting to Your GCP Project)

When registering an agent deployed on Agent Engine (Vertex AI), you need to tell TraptureIQ how to authenticate to your Google Cloud project. Three options are available:

MethodHow It WorksBest For
Authorize with Impersonation (Recommended)TraptureIQ temporarily "acts as" a service account you create in your project. No credentials are exchanged — only short-lived tokens.Most organizations — maximum security with instant revocation
Authorize TraptureIQ PrincipalYou grant TraptureIQ's service account direct access to your Google Cloud project.Teams that want the simplest, fastest setup
Upload SA KeyYou upload a service account key JSON file. TraptureIQ encrypts and stores it.Organizations with cross-domain permission restrictions

See the Authentication Setup guide for detailed step-by-step instructions for each method.


TraptureIQ Platform


Putting It All Together

Here's how everything connects:

  1. You create a Tenant (workspace) — this is your team's home base.
  2. You register Agents — point TraptureIQ to your existing AI services by providing the endpoint URL, framework, and authentication details.
  3. You invite Users — add team members and assign them roles (Admin or User).
  4. You configure Access — decide which platform sections and which agents each user can access.
  5. Your team starts using the platform — chatting with agents, reviewing traces and logs, running evaluations, and monitoring costs.