Identity
OIDC-based authentication for the control plane. SSO via your IdP, MFA enforced for administrators, and SCIM provisioning available on Business and Enterprise plans.
Agento runs in regulated enterprise environments. This page is the short version of how we secure the platform, where we are on compliance, and how to report a vulnerability.
OIDC-based authentication for the control plane. SSO via your IdP, MFA enforced for administrators, and SCIM provisioning available on Business and Enterprise plans.
Fine-grained RBAC and ABAC at workspace, skill, workflow, and connector level. Tenant isolation is enforced at the data, queue, and execution layers.
Every agent action is evaluated by an Open Policy Agent decision point before execution. Decisions are logged immutably.
Workflows run on Temporal. Step state is persisted, retries follow policy, and long-running steps survive infrastructure events.
Browser-based UI automation runs in isolated, ephemeral sandboxes with constrained egress, session recording, and DOM-level evidence capture.
Every execution step produces a structured artifact hashed with SHA-256 and chained for tamper evidence. WORM storage is available for regulated retention.
TLS 1.2+ in transit. AES-256 at rest. Envelope encryption via AWS KMS. Customer-managed keys are available on Enterprise.
Production runs in a private VPC with segmented subnets and no direct database exposure. Secrets are stored in a vault provider and never logged.
We operate a 24/7 on-call rotation for production incidents. Customers will be notified of confirmed security incidents affecting their data within the timeframes required by applicable law and our DPA, and in any case without undue delay.
Status: status.agento.au
Please report issues to security@agento.com.au. We commit to acknowledging reports within 2 business days, providing an initial assessment within 5 business days, and fixing or mitigating confirmed issues on a timeline proportionate to severity.
We do not currently operate a paid bug bounty programme, but we recognise good-faith research on the same terms as the standard disclosure norms.
The current sub-processor list is maintained at /trust and updated within 30 days of any material change. Customers on Business and Enterprise plans can subscribe to change notifications.
For procurement, audit, or security review: security questionnaire pack, sub-processor list, DPA template, SOC 2 report under NDA once issued, and pen test attestation under NDA. Request via security@agento.com.au.