Supporting infrastructure

Security

Security is not the sales pitch. It is the foundation that keeps operations stable and protects the platform from abuse. This page is intentionally high-level.
Operator access controls
Admin access is controlled through users/roles, lockout policies, and optional MFA. Sessions are designed for production use behind a reverse proxy.
Auditability
Operator actions are logged so incidents can be investigated and operational posture can be reviewed.
Support-eligible boundaries
A support-eligible deployment keeps internal services behind the reverse proxy and loopback-only (127.0.0.1). Public exposure of internal ports breaks the operational boundary.
License integrity (high-level)
Commercial licenses are granted for a single domain deployment and are bound to the authorized environment. Attempts to clone or duplicate deployments invalidate usage rights.
Continue evaluation
Product, pricing, what's included, onboarding, and providers.

We use analytics cookies to measure performance and improve operator experience. You can accept or reject optional tracking.