Security Model
Current security model for the hosted Edictum control plane.
AI Assistance
Right page if: you want the current auth and trust boundaries for the hosted control plane. Wrong page if: you want the retired FastAPI/local-auth security model. Gotcha: humans authenticate through Clerk-backed app traffic, and agents authenticate with workspace API keys.
The current security boundary is split between human operators and agents.
Human Access
Human operator traffic is authenticated through the app and edictum-api.
- Clerk-backed identity is the public human-auth path
- browser flows may also use the API’s session cookie for browser SSE
Agent Access
Agents use workspace API keys:
- bearer token with
edk_prefix - scoped to the workspace
- hashed server-side using a deployment-specific salt
Ruleset Integrity
- rulesets are signed server-side
- SDKs can verify signatures when configured to do so
- signature verification is opt-in at the SDK boundary today
Transport Boundary
- agents fetch rulesets and stream updates from
edictum-api - agents still evaluate locally
- control-plane outage does not turn into silent allow behavior
Current Public Truth
The retired local-password / bundle-era FastAPI security model is not the current public source of truth. Use the live API surface and current SDK docs instead.
Last updated on