4 min read

Security & Authentication

AIPI is built with enterprise-grade security at every layer. This page covers how authentication, access control, encryption, and auditing work within the headless ecosystem.


Authentication

Every AIPI request must be authenticated. The platform supports multiple authentication methods depending on your application's architecture:

MethodHow It WorksBest For
API KeyA unique key included in request headersServer-side applications, background services, CLI tools
Session-BasedUsers sign in through the Vantage authentication flow and receive a session tokenUser-facing applications where individuals have accounts
Multi-Factor AuthenticationOptional 2FA via authenticator app or email codeHigh-security environments
PasskeysWebAuthn-based biometric or hardware key authenticationModern, passwordless user authentication

API Key Security


Access Control

AIPI enforces the same role-based access control (RBAC) system used throughout Vantage:

Roles & Permissions

Permission CategoryControls
DashboardWho can view, create, edit, and delete dashboards
WorkflowWho can view, create, execute, and manage workflows
IntegrationWho can connect, configure, and remove integrations
AIWho can use AI features, deploy agents, and manage AI settings
AdminWho can manage users, roles, billing, and organization settings

How Permissions Apply to AIPI

When an AIPI request is made:

  1. The system identifies the user or API key making the request
  2. It resolves the associated role and permissions
  3. The request is allowed or denied based on the role's permission set
  4. Denied requests return an appropriate error response

Example: If a user's role does not include execute_workflows permission, any AIPI request that attempts to trigger a workflow will be rejected.


Data Protection

Encryption

LayerProtection
In TransitAll AIPI communication uses TLS encryption
At RestCredentials, API keys, and sensitive configuration data are encrypted in storage
Credential VaultIntegration credentials (database passwords, API keys, OAuth tokens) are stored in an encrypted vault and never exposed in the UI after saving

Data Isolation


Audit Logging

Every AIPI interaction is logged for compliance and troubleshooting:

Log EntryWhat's Recorded
TimestampWhen the request occurred
User/KeyWho made the request
ActionWhat operation was performed
ResourceWhich data, workflow, or integration was accessed
ResultWhether the request succeeded or failed

Audit logs are accessible to administrators through the Account Logs section in Vantage Settings.


Security Best Practices

PracticeWhy
Use API keys for server-side onlyNever expose API keys in frontend JavaScript — use a backend proxy or serverless function
Enable 2FA for all usersAdds a second layer of protection for user accounts
Use least-privilege rolesAssign only the permissions each user or service actually needs
Rotate API keys periodicallyReduces the risk window if a key is compromised
Monitor audit logsRegularly review access patterns to detect anomalies
Use passkeys when availablePasswordless authentication eliminates credential theft risks


Next Steps