Memorylayer keeps hosted concerns separate from Engram: identity, workspaces, API keys, audit trails, connection kits, and a small HTTP bridge.
Codex, Claude, custom runners, CI jobs, and scripts call a workspace-scoped surface.
GitHub login, workspace membership, hashed keys, audit trails, and usage events.
Every workspace maps to its own Engram schema and operational history.
Retrieval, graph, handoff, curation, and continuity stay inside the real engine.
The hosted service does not pretend to be the memory system. It gives the memory system accounts, keys, URLs, and operational controls.
GitHub OAuth, sessions, members, invites, and dashboard routes.
API keys, audit events, usage events, ingestion runs, exports, and connection kits.
Engram recall, remember, graph, curation, summaries, handoffs, and health checks.
A workspace API call has a small number of predictable checkpoints.
Simple by design: one Python app, one Postgres database, one long-lived memory process model.
Public pages, workspace dashboard, OAuth, and JSON endpoints.
App metadata plus per-workspace Engram schemas.
Repeatable VPS deployment with a narrow exposed port.
Edge TLS and an extra layer against malformed probes.