Authentication & Authorization
The Zild Platform is designed with enterprise-grade authentication and authorization controls. This document explains how access is secured across:- API access
- Webhook endpoints
- User access
- Tenant isolation
- Role-based permissions
Authorization ensures controlled access within tenant boundaries.
Authentication Model Overview
Zild uses a layered authentication model:- API authentication (machine-to-machine)
- Webhook signature verification
- User authentication (admin panel access)
- Tenant-scoped authorization
- Role-based access control (RBAC)
API Authentication
External systems communicate with Zild via secure APIs.API Keys
Each Tenant is issued secure API credentials. Characteristics:- Tenant-scoped
- Required in request headers
- Rotatable
- Revocable
- Auditable
Example Header
Authorization: Bearer YOUR_API_KEY Requests without valid credentials are rejected.API Key Best Practices
For production environments:- Store keys securely (e.g., environment variables or secret manager)
- Never expose keys in frontend code
- Rotate keys periodically
- Restrict access to authorized systems only
Webhook Security
Zild both receives and sends webhooks. Security mechanisms ensure authenticity and integrity.Inbound Webhooks (Channel Providers → Zild)
When receiving webhooks from providers (e.g., WhatsApp or Voice):- Signature validation is enforced (when supported by the provider)
- Endpoint authentication is validated
- Payload structure is verified
- Tenant resolution is performed before processing
Outbound Webhooks (Zild → External Systems)
When Zild triggers webhooks:- Configured per Tenant
- HTTPS endpoints required
- Signed payloads (when enabled)
- Retry logic for transient failures
- Validate request signature
- Restrict IP ranges (if applicable)
- Use idempotency handling
User Authentication (Admin Access)
Access to the Zild Admin Panel requires authenticated user credentials. Supported mechanisms may include:- Email + password
- Single Sign-On (SSO)
- Enterprise identity provider integration (when configured)
- Time-bound
- Revocable
- Tenant-scoped
Role-Based Access Control (RBAC)
Authorization is enforced using role-based permissions. Users are assigned roles within a Tenant. Typical permission scopes include:- View conversations
- Manage agents
- Configure apps
- Manage workflows
- Access analytics
- Manage integrations
- Admin-level configuration
Tenant-Scoped Authorization
All access is tenant-scoped. When a request is authenticated:- The Tenant is identified
- Access is validated against that Tenant
- Data queries are restricted to that Tenant boundary
- API layer
- Data access layer
- Workflow execution layer
- Conversation retrieval layer
Internal Service Authentication
Within the platform architecture:- Services authenticate using internal secure channels
- Service-to-service communication is protected
- Access is restricted to required components only
Principle of Least Privilege
Zild follows the principle of least privilege:- Users receive only required permissions
- API keys are tenant-scoped
- Workflows cannot access other tenant resources
- Integrations are isolated per tenant
Key Rotation & Revocation
API credentials can be:- Rotated
- Revoked
- Reissued
Audit Logging
Security-sensitive actions are logged, including:- API authentication attempts
- Failed authentication attempts
- Role changes
- Configuration changes
- Workflow modifications
- Integration updates
- Compliance auditing
- Security investigations
- Operational traceability
Recommended Security Practices for Integrators
When integrating with Zild:- Use HTTPS for all communication
- Validate webhook signatures
- Implement idempotency in webhook receivers
- Protect API credentials using secret management
- Apply least-privilege access internally
- Monitor authentication logs
Summary
Zild secures access through multiple layers:- API authentication
- Webhook validation
- Tenant-scoped authorization
- Role-based access control
- Audit logging
- Strict tenant isolation
- Secure integration management
- Controlled user access
- Enterprise-grade security posture
Authorization enforces boundaries. Together, they maintain the integrity and isolation of the Zild Platform.