Aegis

Aegis Workspace

Developer

Checking session...
AegisAegis Developer Portal

Developer Search

Press ⌘K or Ctrl+K to jump through guides and API endpoint docs.

Security Controls

Self-Serve Security Controls

Operational baseline for secure integrations: short-lived tokens, request proof, rotation, and incident response.

Token Policy

Least Access

Request only the permissions needed for each integration flow.

Proof Binding

Sender-Constrained Requests

Require request-level proof for sensitive operations and enforce replay checks.

Containment

Fast Revocation

Keep explicit revoke paths for compromised tokens, keys, and affected callers.

Token Lifecycle Controls

  1. Use short token TTLs.
  2. Keep tokens in memory where possible.
  3. Require nonce/jti replay protection.
  4. Rotate keys on a fixed schedule.
  5. Trigger emergency revocation on suspicious activity.

Key Rotation Runbook

1. Register new signing key.
2. Roll callers to the new key.
3. Confirm traffic shift.
4. Revoke old key.
5. Monitor for residual old-key traffic.

Use a dual-key window for cutover, then retire old keys immediately after traffic confirmation.

Auth Onboarding

Setup details for user and workload authentication paths.

Open Auth Docs

Security Model

Architecture view for proof binding and incident handling.

Open Security Model

Error Handling

Runtime error categories and recommended remediation.

Open Error Catalog