Authentication

CloudNito employs a robust authentication system to ensure secure access to your AWS cost optimization platform. Here's an overview of our authentication process:

  1. User Registration :

    • New users sign up using their work email address.

    • Email verification is required to activate the account.

  2. Login Methods :

    • Standard email/password login

    • Single Sign-On (SSO) integration with popular identity providers

  3. Password Policy :

    • Enforces strong password requirements

    • Secure password reset process

  4. API Authentication :

    • Secure API keys for programmatic access

    • Token-based authentication for API requests

  5. Role-Based Access Control (RBAC) :

    • User roles (Administrator, Manager, Viewer) determine feature access

    • Granular permissions within roles

  6. Audit Logging :

    • All authentication events are logged for security analysis

  7. Integration with AWS :

    • Secure handling of AWS credentials

    • Support for IAM roles for cross-account access

CloudNito's authentication system is designed to provide a balance of security and usability, ensuring that your sensitive AWS cost data remains protected while allowing seamless access for authorized users.

Last updated