Skip to main content

Setup your SurePath AI tenant

The first steps you should take to integrate the SurePath AI solution into your organization.

Updated over 2 months ago

Start the SurePath AI configuration by logging into the platform:

  1. Access the Admin interface at:

  2. Log in using the Magic Link authentication method.

  3. You can add additional admin users as needed:

    1. Note: end users will be imported during the Directory Synchronization step

SSO configuration integration

  1. Access the SurePath AI admin interface to setup SSO in the Identity tab at:

  2. Instructions can be found here:

Directory synchronization

  1. Access the SurePath AI admin interface to setup SCIM in the Identity tab at:

  2. Instructions can be found here:

Configure your Default Policy for GenAI

Setup Public Services Traffic Interception

  1. Traffic intercept is required for Public GenAI service interception

    1. Traffic intercept is NOT required for access to https://portal.surepath.ai or https://admin.surepath.ai

  2. All available traffic intercept methods are documented here: https://help.surepath.ai/en/collections/11740645-traffic-integration-interception

    1. Choose the integration that best fits the available tools in the organization

    2. SASE methods of traffic intercept are preferred if available

In addition to the above steps you can also brand messaging to your end users in the tabs here: https://admin.surepath.ai/config/org-settings?tab=branding

Setup a Private Model

  1. You will first setup a Connector and enter authentication information at:

  2. Instructions can be found here:

  3. Add a Private Model

  4. Assign and allow the private model and allow public models in the default policy:

  5. Access the Private Model via the SurePath AI Portal at:

  6. This model will be used exclusively by your organization and resides in your cloud environment.

  7. Additional charges for the private model(s) will be applied to your account from your Cloud provider, not SurePath AI.

Review the RBAC/Group Based Security Model

  1. View the security group design:

  2. These rules apply to public/private model access and context data.

  3. Everyone will have the Default Policy applied to their traffic.

  4. Configure additional groups as needed.


​

Did this answer your question?