Security & Access Control
Security & IAM.
Enterprise access control from day one. Not bolted on later.
Every API request is evaluated against your roles and policies. Custom roles, scoped permissions, encrypted secrets, and bring-your-own-keys. You decide who can access what. Down to the individual office.

IAM console. Manage roles, policies, and assignments from one place.

The Problem
AI without access control is a liability.
Giving an AI agent access to your data and APIs without fine-grained permissions is like giving every employee the admin password. It works until it does not. The more agents you run, the more critical this becomes.
Common security gaps in AI platforms
- Most AI platforms have no role system. Everyone gets the same access.
- Credentials shared across agents. One compromise exposes everything.
- No audit trail. You can not see what an agent accessed or when.
- Scaling means duplicating permissions manually for every new user.
- LLM API keys hardcoded in config files. No isolation, no rotation.
- No way to restrict an agent to a specific workspace or office.
Roles & Policies
AWS-style access control. Built for AI workforces.
Every request is evaluated against your policies. Actions span every domain in the platform. Custom roles with multi-statement policies. Wildcard patterns for flexible resource matching. Deny-first evaluation. If it is not explicitly allowed, it is denied.
Built-in roles
Full Admin
Complete access to everything.
Workspace Admin
Full control over offices, data, agents, and group chats.
Office Operator
Manage a single office. Secrets, sessions, and messaging.
Viewer
Read-only across the entire workspace.
Console Admin
IAM, members, settings, billing at the org level.
Office Agent
Machine identity for VMs. Minimal permissions.
Custom roles and policies
Built-in roles cover the common cases. When you need more control, create custom roles with your own policies. Each policy contains statements with an effect (allow or deny), a list of actions, and a list of resource patterns. Attach multiple policies to a single role. Assign roles to users scoped to a specific workspace, office, or globally.
Scope hierarchy
Permissions are scoped to a resource boundary. A workspace admin for Workspace A can not access Workspace B. An office operator for Office 3 can not see Office 4. Boundaries stack. Global access requires explicit wildcard assignment.
console
workspace/{id}
office/{id}
namespace/{id}
Deny-first evaluation
A single deny statement anywhere overrides all allows. No exceptions. If no policy explicitly allows the action, it is denied by default. Owner bypass exists only for the tenant creator.
Secrets & Encryption
Credentials are never stored in plaintext.
API keys, tokens, and credentials are encrypted at rest (AES-256-GCM) in Humanik Cloud's per-office vault. They are decrypted only at boot time, injected as scoped environment variables into the agent subprocess, and never written to disk, never logged, and never visible to other offices.
Learn how offices handle secretsPer-office vault
Every office has its own encrypted secrets. Nothing shared between employees.
Runtime-only decryption
Secrets decrypted at boot. Injected as env vars. Ephemeral.
LLM proxy isolation
LLM keys injected server-side through a localhost proxy. Agent never sees them.
Environment whitelist
Only approved variables visible to the agent. Infrastructure secrets blocked.
Service account keys
API keys in hsk_/hss_ format. SHA-256 hashed. Shown once. Never retrievable.
Bearer token auth
Internal tool calls authenticated per request. No unauthenticated access.
Service Accounts
Programmatic access with the same IAM controls.
Create service accounts for automated workflows and external integrations. Generate API keys, assign roles, and control access the same way you would for a human user. Service accounts authenticate via API key and are evaluated by the same IAM engine on every request.
How it works
API key generation
Keys in hsk_/hss_ format. The secret is shown once at creation and never retrievable again. Stored as a SHA-256 hash.
Role assignment
Assign any built-in or custom role to a service account. Same scoping rules as human users. Workspace, office, or global boundaries.
Key lifecycle
Enable, disable, rotate, and revoke keys without deleting the account. Instant enforcement on the next request.
Control everything. Trust nothing by default.
Enterprise-grade access control ready from your first AI employee.