kaman.ai

Docs

Documentation

Guides, use cases & API reference

  • Overview
    • Getting Started
    • Platform Overview
  • Features
    • Features Overview
    • AI Assistant
    • Workflow Automation
    • Intelligent Memory
    • Data Management
    • Universal Integrations
    • Communication Channels
    • Security & Control
  • Use Cases Overview
  • Financial Services
  • Fraud Detection
  • Supply Chain
  • Technical Support
  • Software Development
  • Smart ETL
  • Data Governance
  • ESG Reporting
  • TAC Management
  • Reference
    • API Reference
  • Guides
    • Getting Started
    • Authentication
  • Endpoints
    • Workflows API
    • Tools API
    • KDL (Data Lake) API
    • OpenAI-Compatible API
    • A2A Protocol
    • Skills API
    • Knowledge Base (RAG) API
    • Communication Channels

Security & Control

Enterprise-Grade Protection with Complete Transparency

Kaman is built with security at its core, providing the robust controls enterprises need while maintaining the transparency and usability your teams require. With multi-scope permissions, comprehensive audit logging, and Observatory telemetry, you have complete visibility into all operations.


Security Architecture


Authentication & Identity

Flexible Authentication Options

Support for your organization's identity management:

MethodDescription
Single Sign-On (SSO)Integrate with your identity provider (SAML, OIDC)
Username/PasswordTraditional authentication with strong password policies
Multi-Factor AuthAdditional verification via authenticator apps or SMS
API KeysSecure programmatic access for integrations
OAuth 2.0Token-based authentication with refresh support

Identity Provider Integration

Connect to existing identity systems:

  • Microsoft Azure AD / Entra
  • Google Workspace
  • Okta
  • Auth0
  • Custom SAML/OIDC providers

Session Management

Control how users interact with the platform:

  • Configurable session timeouts
  • Concurrent session limits
  • Session revocation capabilities
  • Activity-based session extension
  • JWT-based token management

Connected Identities

Link external platform accounts to Kaman user identities for seamless cross-channel authentication:

How It Works:

  • Users link external accounts from Settings > Connected Identities
  • Verification flows (phone, email OTP) ensure ownership
  • When a message arrives on a channel, the platform automatically resolves the sender's identity
  • Resolved users inherit their Kaman permissions, credits, and conversation context
  • Supports Telegram, WhatsApp, Slack, Discord, Teams, Email, and more

Multi-Scope Access Control

Hierarchical Permission Scopes

Kaman implements a sophisticated multi-scope permission model:

ScopeAccessUse Cases
GlobalAll users across all organizationsPlatform-wide settings, shared models
Client/OrganizationAll users in an organizationCompany-wide policies, shared resources
RoleUsers with specific rolesDepartment-specific access
PrivateIndividual user onlyPersonal settings, private data

Resolution Priority: Private → Role → Client → Global

Role-Based Access Control (RBAC)

Define what users can do based on their role:

Permission Levels

Granular control over platform capabilities:

PermissionDescription
ViewSee data and resources
ExecuteRun workflows and queries
EditModify configurations and data
AdminFull control including user management
DeleteRemove data and resources

Data-Level Security

Control access at the data level:

Capabilities:

  • Row-Level Security - Users see only relevant records
  • Column Masking - Hide or partially redact sensitive fields
  • Dataset Permissions - Control access to entire datasets
  • Dynamic Filtering - Rules that adapt to user context

Multi-Tenant Isolation

Organization Boundaries

Each organization's data is completely isolated:

Isolation Guarantees:

  • Data stored in separate logical partitions
  • No cross-organization data access
  • Independent configuration and customization
  • Separate credential management per organization

Team Segmentation

Within an organization, further segment access:

  • Department-based data access
  • Project-specific permissions
  • Geographic restrictions
  • Functional role separation

Data Protection

Encryption

Comprehensive encryption for your data:

StateProtection
At RestAES-256-GCM encryption for stored data
In TransitTLS 1.3 for all network communication
CredentialsAES-256-GCM with secure key management
BackupsEncrypted backup storage

Credential Management

Secure handling of connection credentials:

Credential Management Features:

  • Multi-scope credential profiles (User, Team, Org)
  • Universal OAuth Manager - single, unified OAuth flow for all integrations (Google, Zoho, Outlook, and more)
  • Automatic token refresh and rotation
  • No plaintext credential storage
  • Field-type specific handling (OAuth, OIDC, API Key, Basic)
  • Token normalizer handles provider-specific quirks automatically
  • Service-to-service authentication via internal service keys

Data Loss Prevention

Prevent unauthorized data exposure:

  • Export controls and approvals
  • Sensitive data detection
  • External sharing controls
  • Query result limits

Observatory Telemetry

Real-Time Visibility

Kaman's Observatory system provides comprehensive operational visibility:

Tracked Metrics:

CategoryMetrics
PerformanceTTFT (Time to First Token), latency, throughput
QualityResponse ratings, evaluation scores
UsageToken consumption, API calls, active users
ErrorsError rates, failure patterns

Conversation Tracking

Every AI interaction is logged:

  • Session and conversation IDs
  • Message content and metadata
  • Tool calls and results
  • Response quality scores
  • User feedback

Audit & Compliance

Comprehensive Audit Logging

Every action is recorded:

Event TypeInformation Captured
AuthenticationLogin attempts, session creation, MFA events
Data AccessQueries, views, downloads
ConfigurationSettings changes, user management
WorkflowExecution, approvals, modifications
AI ActionsAssistant interactions, sub-agent spawns, tool calls
IntegrationsConnection usage, sync operations

Audit Trail Details

Each audit record includes:

  • Who - User identity and role
  • What - Specific action taken
  • When - Timestamp with timezone
  • Where - IP address, device information
  • Why - Request context and reason (where applicable)
  • Result - Success/failure and outcome

Compliance Support

Built-in support for regulatory requirements:

Compliance Features:

  • Data retention policies
  • Privacy impact assessments
  • Automated compliance reports
  • Evidence collection for audits
  • OpenLineage for data lineage

Operational Security

Infrastructure Security

Platform infrastructure is hardened:

  • Regular security patching
  • Vulnerability scanning
  • Penetration testing
  • DDoS protection
  • Container security

Observability Stack

Comprehensive monitoring with:

ComponentPurpose
GrafanaVisualization and dashboards
LokiLog aggregation
TempoDistributed tracing
AlloyMetrics collection

Network Security

Secure network architecture:

  • Private network isolation
  • Firewall rules
  • IP allowlisting options
  • VPN connectivity support
  • TLS everywhere

Monitoring & Response

Continuous security monitoring:

Monitoring Capabilities:

  • Real-time security event analysis
  • Anomaly detection
  • Automated threat response
  • Security incident reporting

Control & Governance

Approval Workflows

Require human approval for sensitive operations:

  • Privileged access requests
  • Data export requests
  • Configuration changes
  • New integrations
  • Sub-agent spawning (optional)

Policy Enforcement

Automatically enforce organizational policies:

  • Password complexity requirements
  • Session timeout rules
  • Data classification enforcement
  • Acceptable use policies
  • Rate limiting

Change Management

Control how the platform evolves:

  • Configuration version control
  • Change approval processes
  • Rollback capabilities
  • Impact assessment

Security Best Practices with Kaman

For Administrators

  1. Implement Least Privilege - Use multi-scope permissions to grant minimum necessary access
  2. Enable MFA - Require multi-factor authentication
  3. Regular Access Reviews - Periodically review user access across all scopes
  4. Monitor Observatory - Watch for unusual activity in telemetry

For Users

  1. Protect Credentials - Never share passwords or API keys
  2. Report Suspicious Activity - Alert security team to concerns
  3. Follow Data Policies - Handle data according to classification
  4. Lock Unattended Sessions - Secure your workstation

For Developers

  1. Use API Keys Securely - Rotate regularly, never hardcode
  2. Validate Inputs - Prevent injection attacks
  3. Encrypt Sensitive Data - Use platform encryption features
  4. Follow Secure Coding - Apply security best practices

Security & Control - Enterprise protection with multi-scope permissions and complete transparency

On this page

  • Enterprise-Grade Protection with Complete Transparency
  • Security Architecture
  • Authentication & Identity
  • Flexible Authentication Options
  • Identity Provider Integration
  • Session Management
  • Connected Identities
  • Multi-Scope Access Control
  • Hierarchical Permission Scopes
  • Role-Based Access Control (RBAC)
  • Permission Levels
  • Data-Level Security
  • Multi-Tenant Isolation
  • Organization Boundaries
  • Team Segmentation
  • Data Protection
  • Encryption
  • Credential Management
  • Data Loss Prevention
  • Observatory Telemetry
  • Real-Time Visibility
  • Conversation Tracking
  • Audit & Compliance
  • Comprehensive Audit Logging
  • Audit Trail Details
  • Compliance Support
  • Operational Security
  • Infrastructure Security
  • Observability Stack
  • Network Security
  • Monitoring & Response
  • Control & Governance
  • Approval Workflows
  • Policy Enforcement
  • Change Management
  • Security Best Practices with Kaman
  • For Administrators
  • For Users
  • For Developers