Skip to main content

Security

  • Authentication: Managed via OAuth2, OpenID Connect, or external Identity Providers.
  • Authorization: Implements Role-Based Access Control (RBAC) for workflow tasks and data access.
  • Data Encryption: Encrypts sensitive workflow data at rest and in transit.
  • Audit Logs: Maintains logs for all workflow activities for compliance and debugging.