AI Models
In this view, you get an overview of all language models that you have available, as well as manage which language models should be available to use in your organization’s Intric environment. As an administrator, you can control exactly which models should be available in different parts of the platform. By then connecting specific models to different security classes, you can ensure that more resource-intensive or specialized models are only used where they are really needed.

Different types of models
For the platform to function optimally, three different types of models are used with specific areas of responsibility:
| Model Type | Description |
|---|---|
| Completion (Language Models) | Functions as the system’s “brain”. Used to generate text, conduct dialogue and solve logical tasks based on the user’s instructions. |
| Embedding (Text Embedding) | Converts information into mathematical vectors to enable search in knowledge libraries (RAG). Rule: Only one active model per security class. |
| Transcription (Transcription) | Converts speech to text. Makes it possible to index audio files and interact with the assistant via voice. |
Model selection – how should I think?
When choosing which models should be active for different assistants or security classes, base your decision on the following principles:
Don’t overcomplicate it: Most modern language models are general-purpose and handle most everyday tasks very well.
Speed vs. Reflection ability: For the personal assistant and simpler tasks, use a fast model. This provides a smoother user experience where responses come directly.
- For complex tasks, such as advanced legal analysis, medical review, or heavy problem-solving, choose a model with high reflection ability, even though these may feel somewhat slower.
Cost efficiency: By limiting access to the most advanced (and often more expensive) models to specific security classes where they are actually needed, you can optimize your organization’s resource usage.
You also need to consider what types of personal data might possibly be processed by the assistants being used. Read more about how this is clarified to users by using Security Classifications.