Skip to main content

Security

Who this is for

Security teams and admins responsible for access control and audit posture.

Goal

Understand Owlie’s security model and where to configure security controls.

Prereqs

  • /fundamentals/glossary

Success criteria

You can locate security‑related configuration and evidence.

Core topics

  • Authentication and API keys
  • Audit logging and evidence
  • Data handling and retention

Example

Rotate an API key used by a CI pipeline and confirm audit logs capture the change.

Troubleshooting

  • If access is denied, verify the user’s role in /reference/roles-permissions.

Next steps

  • /security/audit-logging
  • /security/data-handling
  • /api/authentication