Authentication and access
- NextAuth based authentication
- Workspace scoped role model (Owner/Admin/Member)
- Route level authorization checks on API handlers
Trust center
This page summarizes technical controls, data handling expectations, and operational transparency links.
SOC 2 Type II readiness artifacts are maintained as part of the ongoing control program. Procurement review requests can be sent tohello@incaty.com.