Authentication & Authorization
Understanding Thena Platform’s security model and access control system
Thena Platform implements a robust security model based on Google’s Zanzibar authorization system, providing enterprise-grade security with fine-grained access control.
Authentication
User Authentication
Authentication Methods
-
JWT-Based Authentication
- Secure token-based authentication
- Configurable token expiration
- Refresh token support
-
SSO Integration
- SAML 2.0 support
- OpenID Connect
- Custom SSO providers
-
API Key Authentication
- Secure machine-to-machine communication
- Rate limiting and usage tracking
- Key rotation policies
Authorization
Zanzibar-Style Authorization
Thena Platform uses a Zanzibar-inspired authorization system that provides:
-
Fine-Grained Access Control
- Object-level permissions
- Relationship-based access
- Dynamic permission evaluation
-
Permission Types
- Direct permissions
- Inherited permissions
- Computed permissions
-
Access Levels
- View
- Edit
- Admin
- Custom roles
Permission Model
Scope Evaluation
The platform performs runtime scope evaluation to determine:
-
User Context
- Current organization
- Team memberships
- Role assignments
-
Resource Access
- Direct permissions
- Inherited permissions
- Temporary access grants
-
Action Authorization
- Operation-specific checks
- Conditional logic
- Policy enforcement
Best Practices
Security Implementation
-
Token Management
- Implement secure token storage
- Regular token rotation
- Proper token validation
-
Permission Design
- Follow principle of least privilege
- Group related permissions
- Regular permission audits
-
Error Handling
- Proper authentication errors
- Clear authorization messages
- Secure error logging
Integration Guidelines
-
API Security
- Use HTTPS only
- Implement rate limiting
- Validate all inputs
-
Client Implementation
- Secure credential storage
- Token refresh handling
- Error recovery
Common Use Cases
Multi-Tenant Security
Example Multi-Tenant Policy
Team-Based Access
Team Access Configuration
Next Steps
- Learn about Permission Management
- Explore Organization Settings
- Review Security Best Practices