Security & Data Practices

Induction to data and authentication all inside one application

We prioritize security and follow these practices to keep information safe.

External Systems Credentials

Storing Credentials

All credentials are stored with 256-bit encryption keys, and there is no API to retrieve them for the user. They are sent only during processing, after which access is revoked from the engine.

Data Masking

We implement a robust data masking mechanism where third-party credentials or any sensitive information are systematically censored within the logs, guaranteeing that sensitive information is never stored or documented.

OAuth2

Integrations with third parties are always done using OAuth2, with a limited number of scopes when third-party support allows.

Vulnerability Disclosure

Rantir is an open-source project that welcomes contributors to test and report security issues.

For detailed information about our security policy, please refer to our Security Policy at: rantir.com/security

Access and Authentication

Role-Based Access Control (RBAC)

To manage user access, we utilize Role-Based Access Control (RBAC). Team admins assign roles to users, granting them specific permissions to access and interact with projects, folders, and resources. RBAC allows for fine-grained control, enabling administrators to define and enforce access policies based on user roles.

Single Sign-On (SSO)

Implementing Single Sign-On (SSO) serves as a pivotal component of our security strategy. SSO streamlines user authentication by allowing them to access Rantir with a single set of credentials. This not only enhances user convenience but also strengthens security by reducing the potential attack surface associated with managing multiple login credentials.

Audit Logs

We maintain comprehensive audit logs to track and monitor all access Rantir within Rantir. This includes user interactions, system changes, and other relevant events. Our meticulous logging helps identify security threats and ensures transparency and accountability in our security measures.

Password Policy Enforcement

Users log in to Rantir using a password known only to them. Rantir enforces password length and complexity standards. Passwords are not stored; instead, only a secure hash of the password is stored in the database. For more information.

Privacy & Data

Supported Cloud Regions

Presently, our cloud services are available in Germany as the supported data region.

We have plans to expand to additional regions in the near future. If you opt for self-hosting, the available regions will depend on where you choose to host.

Policy

To better understand how we handle your data and prioritize your privacy, please take a moment to review our Privacy Policy. This document outlines in detail the measures we take to safeguard your information and the principles guiding our approach to privacy and data protection.

Updated on
June 4, 2025
Did this page help you?
Yes
No
Table of Contents

Documentation Overview

Explore our collection of intuitive integration pieces for effortless implementation.

Data & Authentication

Updated

Easily test and examine endpoint behaviors by making requests with Rantir Cloud.

TIR Templates

Updated

Read about our TIR Templates and view our Changelogs and Transfer documentation

API Documents

Connect to Rantir with verification simple with our SDK and API Requests.

Licensing Explorer

Understand our GPL and Fair Use license combination for using templates & Rantir Cloud

Integrations & Workflows

No-code

Streamline your decision-making process with an automated workflow and create robust AI applications, code-free.

Embeddings

No-code

Create user autho, form and data embeds within the CMS architecture that works with any stack to build application on top of Figma Sites, Webflow, ect.

TIR Customization

No-code

Effortlessly tailor the visual aesthetics & functionality of your SaaS application templates and learn how to chat with your template to make changes.