Security
Security is foundational to everything we build. This page describes our comprehensive approach to protecting your identity infrastructure with transparency and accountability.
Security Philosophy
Auth Flow exists to secure identity. We operate under the principle that identity infrastructure must be secure by default, transparent in operation, and resilient against evolving threats.
Architecture Overview
Auth Flow is designed as modular, composable infrastructure:
Stateless API Layer
No single point of failure
Encrypted Data Stores
AES-256 at rest, TLS 1.3 in transit
Tenant Isolation
Complete data separation
Edge Validation
Low-latency global checks
Encryption
In Transit
All connections use TLS 1.3. HTTPS is enforced for all endpoints. HSTS headers prevent downgrade attacks.
At Rest
Data is encrypted using AES-256. Keys are managed via dedicated KMS with automatic rotation.
Credentials
Passwords are hashed with Argon2id and per-user salts. We never store plaintext passwords.
Authentication Security
We support passkeys (WebAuthn/FIDO2), magic links, TOTP, and social login. Rate limiting and progressive delays protect against brute force. Sessions use secure, HTTP-only, SameSite cookies.
Access Control
Fine-grained RBAC with role hierarchies and organization scoping. API keys are capability-scoped and stored as hashes.
Infrastructure Security
SOC 2 Type II certified infrastructure with network segmentation, DDoS protection, geographic redundancy, and automated patching.
Monitoring & Incident Response
24/7 monitoring, comprehensive audit logging, and documented incident response. Breach notification within 72 hours per GDPR.
Compliance
SOC 2 Type II
Annual audits, reports under NDA
GDPR
DPA, SCCs, data export APIs
HIPAA
BAAs for healthcare customers
CCPA/CPRA
California privacy compliance
Your Responsibilities
You are responsible for:
- Securing your applications and implementing proper session handling
- Protecting API keys and never committing them to source control
- Enabling MFA for users when appropriate
- Monitoring audit logs for suspicious activity
- Keeping your integration code up to date
Report a Vulnerability
We appreciate responsible disclosure and will acknowledge reports within 24 hours.