Identity & Access

Identity and Access Management

The platform's IAM system provides authentication, role-based access control, API keys, and service accounts for secure multi-tenant operations.

The platform's Identity and Access Management (IAM) system controls who can access what. It covers authentication (verifying identity), authorization (checking permissions), and account management.

Key components

ComponentPurpose
AccountsUser and service identities
OrganizationsTenant boundaries with membership
RolesNamed sets of permissions
PermissionsGranular resource:action rights
API keysProgrammatic access tokens
Service accountsAutomated identities for apps and agents

Identity provider

The platform uses Zitadel as its identity provider. Zitadel handles:

  • User registration and login
  • Password management and recovery
  • Session management and token issuance
  • Service account creation
  • OIDC-compliant authentication flows

All authentication goes through Zitadel, and the platform receives verified identity tokens.

Access control model

Account
  → assigned to Organization (with a Role)
    → Role contains Permissions
      → Permissions grant access to resources and operations

Every API request is authenticated and authorized:

  1. The request includes an access token
  2. The token is verified and the account is identified
  3. The account's role within the current organization is resolved
  4. The requested operation is checked against the role's permissions
  5. Access is granted or denied

In this section