Synkrato Security
Security considerations
Synkrato is built considering the highest IT security standards and best practices, which includes secure default configuration, sensitive data protection, authentication ,and access control. Synkrato runs on Azure Cloud.
Synkrato uses the HTTPS secure protocol and encrypts data in transit and at rest.
Users can access the application using username/password and is OAUTH2/OpenId compliant. JWT (JSON Web Tokens) used to authorize users and protect REST API. Synkrato also integrates with Okta for SSO.
Synkrato is also VAPT compliant thereby keeping the data secured and protecting the software from evolving threats.
Last updated