Terminology
This page summarizes key terms used across the docs for consistent understanding.
Core Concepts
- BYOK (Bring Your Own Key): A model where users use their own Provider Keys from official platforms while accessing them through XAIโs unified entry and governance layer.
- Provider Key / Upstream Key (ไธๆธธๅฏ้ฅ): The original API Key obtained by users from official platforms like OpenAI, Claude, DeepSeek, etc., then added to XAI and kept in protected custody.
- XAI API Key / Virtual Key (่ๆๅฏ้ฅ): The exclusive key assigned by the XAI system to users (format:
sk-Xvs...), used to call the XAI Base URL. - Zero Markup Pricing: API call charges are deducted directly from the user's official account, with XAI charging no markup or service fees.
- End-to-End Encryption: Provider Keys are stored in protected form and used only within authorized request flows.
Account System
- Owner (ไธป่ดฆๆท): A first-level account created by self-signup on
xaicontrol.com, with Admin configuration permissions to manage its own third-party AI API Keys and distribute resources to sub-accounts. - Sub-account (ๅญ่ดฆๆท): A child account created by the owner to operate within distributed capability and governance boundaries; it does not have Admin configuration permissions.
- Descendants (ๅไปฃ็จๆท): Any users in the owner's subtree; see "User Hierarchy".
- DNA: Lineage path (e.g.,
.1.42.) used to filter user groups. - Inheritance: The mechanism by which upper-level governance boundaries continue down the account tree.
Routing & Key Management
- Level (็ญ็บง): Abstraction for key pools and model routing. Users can assign different Provider Keys to different Levels.
- Key Pool (ๅฏ้ฅๆฑ ): A collection of multiple Provider Keys under the same Level, automatically rotated by the system to distribute request pressure.
- Model Mapper (ๆจกๅๆ ๅฐ): Aliasing models to targets (e.g.,
gpt-4=gpt-4-turbo), configurable at user-level or owner-level. - Sleep (ไผ็ ): After errors (e.g., 429, 5xx), the key is temporarily removed from rotation and rejoins after a waiting period.
- Switch Over (ๆ ้ๅๆข): Move from one Level to another when the current Level is unavailable.
Security & Permissions
- Access Control: Governance mechanisms used to constrain request origin, capability scope, and operation scope.
- Allowlist: A control model where only explicitly permitted origins, capabilities, or operations are allowed.
- Protected Security Material (ๅฎๅ จไฟๆคๆๆ): Internal security material used by the platform to protect sensitive credentials; ordinary users do not need to know its concrete form.
See also:
- โAccess Controlโ
- โUser Hierarchyโ