Try Bifrost Enterprise free for 14 days.
Request access
[ BIFROST GOVERNANCE ]

Virtual Keys, Budgets &
Enterprise RBAC

Control who can access which models, what budget limits apply, and which tools they can use from a single policy layer.

[ OSS GOVERNANCE ]

Production-Ready Access Control in Open Source

Bifrost OSS includes comprehensive governance features for access control, cost management, and routing - all free and open source.

Virtual keys

Primary governance entity providing authentication, access control, budgets, and rate limits per consumer. Support for multiple header formats (OpenAI, Anthropic, Gemini-compatible).

OSS

Intelligent routing

Weighted load balancing across providers with automatic failover. Model and provider restrictions per virtual key with API key-level binding for environment separation.

OSS

Hierarchical budgets

Independent cost tracking at Customer → Team → Virtual Key → Provider levels. Costs calculated from the model catalog and deducted across all applicable tiers automatically.

OSS

Rate limits

Token and request-based throttling at provider and virtual key levels. Flexible reset durations from 1 minute to 1 month with automatic enforcement.

OSS

MCP tool filtering

Allow-list controls for Model Context Protocol tools per virtual key. Fine-grained permissions with wildcard support and automatic header generation.

OSS

Required headers

Enforce custom HTTP headers on every request for tenant isolation, audit trails, and routing metadata. Case-insensitive validation with 400 rejection.

OSS

[ VIRTUAL KEYS ]

Primary Governance Entity

Virtual keys authenticate requests and enforce access control, budgets, and rate limits per consumer.

Model filtering

Restrict which AI models users can access

Provider control

Limit access to specific AI providers

Budget management

Independent cost tracking per virtual key

Rate limiting

Token and request-based throttling

API key restrictions

Bind to specific provider keys

Status control

Instantly enable or disable access

Multiple Header Format Support

x-bf-vk

sk-bf-*

Native Bifrost

Authorization

Bearer

OpenAI-compatible

x-api-key

sk-ant-*

Anthropic-compatible

x-goog-api-key

AI*

Gemini-compatible

[ INTELLIGENT ROUTING ]

Adaptive Load Balancing with Automatic Failover

Distribute traffic across providers with configurable weights and automatic fallback chains.

Adaptive load balancing

Automatically optimizes traffic distribution across providers and keys based on real-time performance metrics.

Automatic failover

Create fallback chains ordered by weight when primary providers fail or hit rate limits

Provider restrictions

Whitelist specific provider-model combinations with empty array defaulting to catalog detection

API key binding

Restrict VKs to specific provider API keys for environment separation (dev/test/prod)

[ HIERARCHICAL BUDGETS ]

Cost Management at Every Level

Independent cost tracking at Customer, Team, Virtual Key, and Provider levels with automatic deduction across all tiers.

Level 1

Customer

Top-level organization with independent budget

Level 2

Team

Department-level budget within customer

Level 3

Virtual Key

Individual access token budget

Level 4

Provider Config

Per-provider spending limits

All Applicable Budgets Must Pass

When a transaction occurs, the same cost deducts from every relevant level simultaneously. A single exhausted budget at any tier blocks the entire request.

[ ENTERPRISE GOVERNANCE ]

Advanced Features for Compliance and Scale

Plug into your existing identity provider. Every user, role, and action is tracked end-to-end for full regulatory visibility.

Role-based access control

Fine-grained permissions with custom roles across Bifrost resources. Pre-configured Admin, Developer, and Viewer roles plus unlimited custom roles.

Enterprise

SSO integration

OpenID Connect with Okta and Microsoft Entra. Automatic role assignment from IdP groups with highest-privilege logic for multi-group users.

Enterprise

Team synchronization

Automatic team creation from identity provider groups. Hierarchical structure from customer through team to individual user levels.

Enterprise

User-level governance

Individual authentication and budget allocation. Personal access tracking with per-user budget enforcement.

Enterprise

Comprehensive audit logs

Access, usage, data, and compliance-focused reporting. Audit trails and report generation for security posture and regulatory health.

Enterprise

Compliance frameworks

SOC 2 Type II, GDPR, ISO 27001, and HIPAA compliance. Automated controls with risk assessment and regulatory reporting.

Enterprise

[ ROLE-BASED ACCESS CONTROL ]

Access Control, Flexible to Your Needs

Start with Admin, Developer, and Viewer. Create custom roles as your team structure evolves.

Principle of least privilege

Users receive only the permissions they need for their job function, reducing security vulnerabilities and preventing accidental misconfigurations.

Simplified user management

Assign roles once instead of configuring individual permissions. New team members inherit appropriate access automatically through role assignment.

Audit-ready access tracking

Demonstrate to auditors exactly who has what access. Audit logs track permission changes over time for compliance frameworks like SOC 2 Type II and GDPR.

Custom roles for specialized teams

Create tailored roles for QA teams, security auditors, or compliance officers. Custom roles adapt to your organizational structure.

Three Pre-Configured Roles

Admin

Full control over all Bifrost resources and configurations

Platform engineers, security admins

Developer

Manage technical resources without administrative privileges

Engineering teams, DevOps

Viewer

Read-only access for monitoring and compliance

Finance, compliance, executives

[ CONFIGURATION ]

Four Ways to Configure Governance

Web UI

Visual dashboard for configuring virtual keys, budgets, routing, and RBAC

REST API

Programmatic management via endpoints at /api/governance/*

config.json

Declarative file-based configuration for GitOps workflows

Bifrost CLI

Interactive terminal setup for managing governance settings from your workflow

[ USE CASES ]

Real-World Governance Scenarios

Multi-tenant SaaS platforms

Isolate tenants with virtual keys, enforce per-tenant budgets, and track usage with required headers. Automatic cost allocation across customers.

Enterprise team management

Department-level budgets with team-specific provider access. SSO integration syncs teams from Okta/Entra with automatic role assignment.

Cost control & optimization

Hierarchical budgets prevent runaway spending. Weighted routing sends 80% of traffic to cost-effective providers with automatic failover to premium options.

AI agent security

MCP tool filtering restricts which tools agents can access. Virtual key permissions ensure agents only call approved models and providers.

Regulatory compliance

Required headers enforce audit trails. RBAC controls who can configure guardrails. Comprehensive logs support SOC 2 Type II, HIPAA, GDPR requirements.

Environment separation

Bind virtual keys to dev/staging/prod API keys. Developers use test keys with lower budgets while production gets dedicated high-limit keys.

Ready to Deploy Comprehensive LLM Governance?

Start with OSS governance (virtual keys, budgets, routing) and upgrade to Enterprise when you need RBAC and SSO.

[ BIFROST FEATURES ]

Open Source & Enterprise

Everything you need to run AI in production, from free open source to enterprise-grade features.

01 Governance

SAML support for SSO and Role-based access control and policy enforcement for team collaboration.

02 Adaptive Load Balancing

Automatically optimizes traffic distribution across provider keys and models based on real-time performance metrics.

03 Cluster Mode

High availability deployment with automatic failover and load balancing. Peer-to-peer clustering where every instance is equal.

04 Alerts

Real-time notifications for budget limits, failures, and performance issues on Email, Slack, PagerDuty, Teams, Webhook and more.

05 Log Exports

Export and analyze request logs, traces, and telemetry data from Bifrost with enterprise-grade data export capabilities for compliance, monitoring, and analytics.

06 Audit Logs

Comprehensive logging and audit trails for compliance and debugging.

07 Vault Support

Secure API key management with HashiCorp Vault, AWS Secrets Manager, Google Secret Manager, and Azure Key Vault integration.

08 VPC Deployment

Deploy Bifrost within your private cloud infrastructure with VPC isolation, custom networking, and enhanced security controls.

09 Guardrails

Automatically detect and block unsafe model outputs with real-time policy enforcement and content moderation across all agents.

[ SHIP RELIABLE AI ]

Try Bifrost Enterprise with a 14-day Free Trial

[quick setup]

Drop-in replacement for any AI SDK

Change just one line of code. Works with OpenAI, Anthropic, Vercel AI SDK, LangChain, and more.

1import os
2from anthropic import Anthropic
3
4anthropic = Anthropic(
5 api_key=os.environ.get("ANTHROPIC_API_KEY"),
6 base_url="https://<bifrost_url>/anthropic",
7)
8
9message = anthropic.messages.create(
10 model="claude-3-5-sonnet-20241022",
11 max_tokens=1024,
12 messages=[
13 {"role": "user", "content": "Hello, Claude"}
14 ]
15)
Drop in once, run everywhere.

[ FREQUENTLY ASKED QUESTIONS ]

Common Questions

What is the difference between OSS and Enterprise governance?

OSS includes virtual keys, budgets, rate limits, routing, MCP tool filtering, and required headers - sufficient for most production workloads. Enterprise adds RBAC with SSO (Okta/Entra), user-level governance, team synchronization, comprehensive audit logs, and compliance frameworks (SOC 2 Type II, HIPAA, GDPR, ISO 27001).

How do hierarchical budgets work?

Budgets cascade from Customer → Team → Virtual Key → Provider. All applicable budgets must pass for a request to proceed. When a transaction occurs, the same cost deducts from every relevant level simultaneously. A single exhausted budget at any tier blocks the entire request. Read more about Budgets.

Can I enforce different provider access for dev vs. production?

Yes. Virtual keys support API key restrictions, allowing you to bind VKs to specific provider API keys. Create separate VKs for dev (using test keys with low budgets) and production (using dedicated high-limit keys) for complete environment separation.

How does weighted routing work with automatic failover?

Configure weights per provider (e.g., 80% Azure, 20% OpenAI). Bifrost normalizes weights to sum 1.0 and distributes traffic proportionally. When a provider fails or hits rate limits, Bifrost creates fallback chains ordered by weight for automatic failover.

What happens when a virtual key exceeds its budget or rate limit?

Requests return specific HTTP status codes: 402 for budget exceeded, 429 for rate limits exceeded. Virtual keys remain functional for other operations but block LLM requests until budgets reset (based on configured duration) or rate limit windows expire.

How does SSO integration handle users in multiple groups?

When a user belongs to multiple Okta/Entra groups mapped to different Bifrost roles, the system automatically assigns the highest privilege role. For example, if a user is in both viewer and admin groups, they receive admin permissions.