Dev / Security / Ops

Authentication

Authenticate via service tokens or OAuth. All tokens are scoped to a workspace and environment for granular control.

Service tokens

Create tokens from the dashboard or API. Each token includes scopes like automations:trigger oroutcomes:read. Rotate tokens quarterly or use the rotation API.

OAuth 2.0

OAuth apps can request delegated access for user-driven actions inside PantherIQ. We support Authorization Code flow with PKCE. Tokens expire after one hour; refresh tokens live 30 days unless revoked.

Request signing

Include the X-PantherIQ-Signature header with HMAC-SHA256 signatures when making sensitive requests. This ensures replay attacks are rejected and provides strong non-repudiation for audit logs.