Security and Governance
Security and Governance
Akurion is designed for enterprise knowledge workflows where access boundaries and source governance matter.
Access Model
Akurion uses:
- Users
- Subscriptions/workspaces
- Projects
- Project memberships
- Roles
- Organization admins
- SSO connections and domains
- Project API keys
- Subscription API keys
Project access is enforced server-side for sensitive actions and queries.
API Keys
Akurion supports two API key scopes:
| Key type | Purpose |
|---|---|
| Project key | Directly accesses one project. |
| Subscription key | Accesses all or selected projects in a workspace. Project context is required for project-level tools. |
API key security behavior:
- Plaintext is shown once at creation.
- Runtime validation uses hashed key artifacts.
- Keys can include permissions, credit budgets, rate limits, project scope, and expiration.
- Subscription keys can be scoped to all projects or selected projects.
SSO and Organization Controls
Akurion includes control-plane support for organization SSO:
- OIDC start, callback, and token exchange endpoints.
- SSO domains.
- SSO user links.
- Subscription admin assignments.
- Workspace naming.
Encryption and Secrets
Projects can enable encryption settings for sensitive content. Runtime services use Secret Manager references for operational credentials.
Operational guidance:
- Do not put secrets in code, Dockerfiles, logs, docs, or screenshots.
- Use managed credentials, workload identity, or secret references.
- Rotate API keys and OAuth credentials when access changes.
- Use source-specific credentials with least privilege.
Credits and Rate Limits
API and MCP requests are rate limited and credit tracked. Tool calls report credit usage metadata where available.
Credit tracking helps teams:
- Allocate usage by project.
- Monitor high-cost workflows.
- Understand API and chat usage.
- Prevent runaway agent loops.
Audit and Operations
Enterprise deployments should review:
- API key creation, update, deletion, and usage.
- Data source creation, updates, resyncs, and deletion.
- File access and signed URL generation.
- Graph edits and rebuilds.
- Workflow runs and retries.
- Admin changes.
- Failed syncs and retry escalations.
Data Handling Best Practices
- Start pilots with a focused project and limited source scope.
- Use metadata filters and project instructions for governance.
- Disable web search for confidential projects.
- Limit admin roles.
- Use selected-project subscription keys for integrations.
- Review source health and file status regularly.
- Remove stale sources and unused keys.