Security

Authentication, tenant isolation, and trusted enrollment.

Security starts with signed-in users, tenant-scoped desired state, and a separate enrollment path for agent runtimes.

authentication
tenant isolation
keys
trust bundle
enrollment
Trust boundary
Keep the client honest and the control plane explicit.

Security here is not a banner. It is the basic contract between signed-in users, enrolled clients, and the data store.

Authentication

Users sign in, agents enroll.

The SaaS surface uses user login, while agent enrollment needs a separate trust path.

User auth

Google and email login for the SaaS control plane.

Agent enrollment

A client token or bundle that ties a machine to a tenant.

Trust bundles

Client-side fingerprints, keys, or certificates that can be rotated.

Session status

Who is logged in, what tenant they belong to, and what the client can do.

Tenant isolation

Keep tenant boundaries visible.

The SaaS version needs clear tenancy so different teams do not mix objects or state.

Tenant ID

Every object belongs to a tenant in the shared SaaS model.

Storage boundary

Cloud and local stores keep tenant data separated by workspace and managed object.

Access model

Pilot workspaces use owner access and tenant-scoped state; advanced role controls are planned for larger teams.

Deployment options

Self-host and local deployments can keep SQLite and NAS options.

Trust

Make the trust boundary visible instead of implied.

The control plane manages desired state; the local runtime applies it and reports verification.

Surface
Boundary
Purpose
Human users
Google and email auth
Access dashboard and tenant-scoped workspace
Agents
Separate enrollment credential
Bind runtime to tenant without using human login
Control plane
Desired state and verification records
Store managed objects and report rollout state
Local runtime
Manifest apply and drift report
Keep runtime execution local and auditable
Revocation
Rotate or remove enrollment bundle
Stop future sync for a runtime
Current vs planned

Available now, with enterprise controls next.

Phase 1 keeps the pilot boundary clear while leaving room for enterprise procurement needs.

Available now
  • Google and email auth
  • Tenant-scoped managed objects
  • Separate agent enrollment
  • Desired-state verification
  • Key and trust-bundle rotation
Planned for scale
  • SSO and SAML
  • Advanced role controls
  • Formal audit exports
  • Enterprise procurement packet
  • Expanded approval workflows
Cluster pages

Split auth, tenant isolation, and enrollment into focused pages.

Move into the pages that separate user auth from client trust and tenant boundaries.