Security is not the sales pitch. It is the foundation that keeps operations stable and protects the platform from abuse. This page is intentionally high-level.
Operator access controls
Admin access is controlled through users/roles, lockout policies, and optional MFA. Sessions are designed for production use behind a reverse proxy.
Auditability
Operator actions are logged so incidents can be investigated and operational posture can be reviewed.
Support-eligible boundaries
A support-eligible deployment keeps internal services behind the reverse proxy and loopback-only (127.0.0.1). Public exposure of internal ports breaks the operational boundary.
License integrity (high-level)
Commercial licenses are granted for a single domain deployment and are bound to the authorized environment. Attempts to clone or duplicate deployments invalidate usage rights.