Security and Privacy

Token Based Authentication

Our web UIs and the following agents and profiles uses token based authentication:

Role Based Access Control

See  for more information.

OIDC Identity Provider


Access control to OIDC authenticated applications is integrated in role model, see  for more information.

Encryption at Rest

See for more information.

Encryption at Transit

The following agents and profiles use TLS:

and the system interfaces use HTTPS and TLS.

Immutable images

Usage Engine is delivered as docker images that are being scanned for any potential CVEs before being made available for download.

Automated certificate management

Use of cert-manager is recommended for deployment in private cloud or AWS, but can be disabled if needed.

See  ,  for more information.

Â