Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.textql.com/llms.txt

Use this file to discover all available pages before exploring further.

Access Settings from the left sidebar by clicking Settings. The panel is divided into the following sections.
Some sections may not be visible depending on your role. If you need access to a setting that isn’t shown, reach out to your organization’s admin.

Personal

Your individual profile and defaults — changes here only affect your account, not the whole org. Profile — Update your display name and profile picture. My Chat Defaults — Set which tools and connectors are pre-selected when you open a new chat.
ToolWhat it does
Web SearchLets Ana search the internet
Text to SQLLets Ana query your databases
JavaScriptLets Ana run JavaScript for visualizations
BashLets Ana run shell commands
OntologyLets Ana use your semantic ontology layer
You can also select which connectors are checked by default. Use Reset to org defaults to revert to whatever the admin has set in Features & Tools. Notifications — Control how you’re notified for Feed mentions and items shared with you (In-App, Email, or Slack).

Members

View and manage everyone in your organization. Admins can:
  • Invite Member — Send an email invite to add someone to the org
  • Assign Roles — Bulk-assign roles to members
  • Search and filter members by role
  • Use the menu on any row to manage or remove a member
See Role-Based Access Control (RBAC) for how roles work.

Roles

Create and manage roles for access control. TextQL has two system roles (admin and member) and supports unlimited custom roles. Custom roles let you scope which connectors, context files, and tools specific users can access. Once a role is created, its permissions are set in the RBAC settings and its access to models is configured under Models. See Role-Based Access Control (RBAC) for full details.

Appearance

Customize the look and feel for your organization. Customize Organization Theme — Upload or remove your organization’s logo. The name shown here is your org name. Customize Playbook Theme — Open the Theme Editor to configure colors, backgrounds, and styling for reports and playbook outputs.

Features & Tools

Org-wide defaults and access controls for tools and features. Admins configure what’s available; users can adjust within those bounds from Personal. Default Chat Mode — Sets the default tools and connectors for all new chats across the org. Tool Access Control — Enable or disable specific capabilities org-wide:
ToolDescription
Web SearchAllow Ana to search the internet
SQL ExecutionAllow Ana to write and run SQL
Ontology AccessAllow Ana to use the semantic layer
Ontology EditingAllow users to edit the ontology
PowerBI IntegrationConnect to Power BI datasets
Tableau IntegrationConnect to Tableau collections
File UploadsAllow users to upload files to chats
Multiple Connector SelectionAllow selecting more than one connector per chat
Chat History SearchEnable searching past chats
Environment VariablesAllow setting env vars in sandboxes
Enable DashboardsTurn on the Dashboards feature
Model SwitchingLet users switch AI models per chat
ObservabilityEnable query observability tools
Response Methodology DropdownShow methodology selector in chat
Beta Features — Additional features are available in beta. Reach out to your dedicated account manager or support@textql.com to have them enabled for your org.

Models

Configure which AI models are available and how they’re accessed. See Model Management for full details. The Models tab has three sub-tabs: Model Catalog — Set the org-wide default model (shown to users as “Default” in the chat picker). Enable or disable individual models, view ACU pricing per 1M tokens, and browse available providers (Anthropic, OpenAI, Fireworks). Role Access — Restrict which models specific roles can use. Useful for cost control — you can lock non-admin roles to cheaper models. Analytics — View model usage across your org.

Security

Controls for user access, identity, and workspace configuration. Allowed Email Domains — Only users with matching email domains can join the org. Toggle Workspace Discoverable by Domain to let matching users self-join without an invite. OIDC Identity Providers — Configure SSO via Okta, Azure AD, Ping Identity, or any OIDC-compliant provider. See Single Sign-On (SSO) for setup guides. SCIM Provisioning — Automate user and group sync from your identity provider using the SCIM 2.0 endpoint (https://app.textql.com/scim/v2). Generate Bearer tokens or create OAuth 2.0 clients here. See SCIM Provisioning for details. Create Sibling Workspace — Spin up a new workspace that shares the same billing tenant and inherits your org’s identity providers and allowed email domains. Workspace Retention — How long thread sandbox state is preserved after last activity (default: 30 days). Active threads are never affected. Delete Organization — Permanently deletes the org and all associated data. Irreversible.

Packages

Install custom Python packages that become available in all Ana sandboxes across your org. Useful for domain-specific libraries (e.g., finance, PDF parsing, NLP). Click + Install Package, enter the package name and version, and it will be installed and listed here. Installed packages are available immediately in new Python cells.

Developers

Manage programmatic access to the TextQL API. See Embedding Ana for how to use these keys. API Keys tab — View all API keys in the org (filterable by owner and status). Click + Create API Key to generate a new key with optional name, expiry, and role scoping. Admins can revoke any key. Service Accounts tab — Create bot identities with fixed roles for production use cases (embeds, automations). Unlike personal keys, service account keys survive employee turnover and have immutable roles. Generate keys from the service account’s detail page.

Audit Log

A tamper-evident log of security and administrative actions across the org. See Audit Log for full details. Filterable by category (Settings, RBAC, Auth, etc.), action type, and time range. Useful for compliance reviews and investigating access incidents.