Security
Who this is for
Security teams and admins responsible for access control and audit posture.
Goal
Understand Owlie’s security model and where to configure security controls.
Prereqs
- /fundamentals/glossary
Success criteria
You can locate security‑related configuration and evidence.
Core topics
- Authentication and API keys
- Audit logging and evidence
- Data handling and retention
Example
Rotate an API key used by a CI pipeline and confirm audit logs capture the change.
Troubleshooting
- If access is denied, verify the user’s role in /reference/roles-permissions.
Next steps
- /security/audit-logging
- /security/data-handling
- /api/authentication