Safe AI Workbench Developer Docs

API Reference

Safe AI Workbench provides enterprise AI capabilities with built-in PHI detection, policy enforcement, and safety controls. The API is organized around REST principles with JSON request/response bodies.

200201400401403404413429500
PHI Detection: All requests are automatically scanned for Protected Health Information using configurable detection policies. Enforcement actions (block, redact, warn, allow) are applied based on your policy configuration.

AI Chat

Execute AI tasks with automatic PHI detection and policy enforcement. Supports file uploads and conversation continuity.

AI Tasks

Pre-built and custom AI tasks for common use cases with configurable parameters and requirements.

File Processing

Upload PDF, DOCX, and XLSX files for AI processing with automatic PHI detection and secure handling.

Policies

Create and manage safety policies with warn, block, redact, or allow actions for sensitive content.

Analytics

Retrieve usage statistics, cost estimates, PHI detection trends, and policy violation reports.

Groups

Manage user groups for task sharing, access control, and group-specific policy enforcement.

Getting Started

Our REST API provides secure access to AI capabilities with built-in compliance controls. Authenticated requests use Bearer tokens, and all responses include comprehensive audit metadata.

  • RESTful endpoints with JSON request/response bodies
  • Bearer token authentication with API keys or JWT tokens
  • Automatic PHI detection and policy enforcement on every request
  • Comprehensive audit logging for compliance requirements
  • Rate limiting with graceful handling guidance
Full documentation: Detailed API documentation with code samples and interactive examples is available to customers in the product's built-in documentation. Contact us to request API access.

Built for Compliance

Every API request is automatically scanned for sensitive data using configurable detection policies. When sensitive content is found, your configured enforcement actions (block, redact, warn, or allow) are applied before processing.

Enterprise Ready

Multi-tenant architecture with organization-level isolation, role-based access control, SSO integration, and comprehensive audit logs for every operation. Built for regulated industries from the ground up.