Skip to main content

Security

  • Authentication: OAuth2 or other authentication methods for external system interactions.
  • Authorization: Access control for different APIs and operations.
  • Data Encryption: Ensures sensitive task and process data is encrypted at rest and during transmission.