Security First
Built with enterprise-grade security from the ground up
Encryption at Rest
All credentials and secrets are encrypted using AES-256 with key rotation support. Keys are stored separately and rotated regularly.
Role-Based Access
Fine-grained permissions let you control exactly who can do what. Admin, Member, and Viewer roles with customizable permissions.
Approval Workflows
Dangerous actions require approval. Optional two-person rule ensures the requester can't approve their own changes.
Comprehensive Audit Logs
Every action is logged with timestamp, actor, IP, and details. Configurable retention up to 365 days.
Tenant Isolation
Complete data isolation between tenants. No cross-tenant access in queries, search, or logs.
API Token Security
Bearer tokens with scopes, expiration, and optional IP allowlists. Tokens are hashed before storage.