Access Control
What it does
Granular access control at the API key, user, and tenant level. Restrict which endpoints each API key can access, limit IP ranges, and enforce least-privilege principles across your organization.
How to use it
Scope API keys
Create keys with specific endpoint permissions — e.g., classify-only or calculate-only access.
Set IP allowlists
Restrict API key usage to specific IP ranges in Dashboard > API Keys > Security.
Assign user roles
Use role-based access (Admin, Developer, Viewer) to control Dashboard permissions.
Review access logs
Check audit logs regularly to verify access patterns match expected usage.
Related Features
AES-256 encryption at rest and TLS 1.3 in transit
RBAC with admin, manager, analyst, and viewer roles
Secure API key authentication with scope-based permissions
Full multi-tenancy with row-level security data isolation
CSP, HSTS, X-Frame-Options, and OWASP-compliant headers