Authentication Methods
ABV supports multiple authentication methods to fit your organizationâs security requirements.Email & Password Authentication
Email & Password Authentication
The default authentication method for ABV. When you sign up with email and password, ABV enforces standard password complexity requirements to ensure account security.Password Requirements:
- Minimum length and complexity standards
- Protection against common passwords
- Secure password reset flow with email verification
Social Logins
Social Logins
Enterprise SSO (OIDC)
Enterprise SSO (OIDC)
For organizations with centralized identity management, ABV supports Enterprise Single Sign-On via OpenID Connect (OIDC).Supported Identity Providers:
- Okta
- Azure Active Directory (Azure AD)
- Google Workspace
- Keycloak
- Any OIDC-compliant provider
Configuration
Your organizationâs SSO provider is configured in ABV by the ABV team. Contact us to enable Enterprise SSO for your organization.
User Login
Users enter their email address and click âContinueâ. ABV detects that the email domain is configured for SSO and redirects to your identity provider.
Authentication
The user authenticates with your identity provider (Okta, Azure AD, etc.) using whatever authentication methods youâve configured (password, MFA, biometrics, etc.).
Enterprise SSO is available on Enterprise plans. Contact sales to learn more.
SSO Enforcement
SSO Enforcement
For maximum security, you can enforce SSO for your entire domain. When SSO enforcement is enabled:
- All users with email addresses from your domain must use SSO
- Email/password authentication is disabled for your domain
- Social logins are disabled for your domain
- Ensures compliance with corporate authentication policies
- Regulatory compliance requiring centralized authentication
- Organizations that want to disable password-based authentication
- Companies requiring MFA for all users (enforced via your IdP)
- Audit trails for all authentication events (via your IdP)
SSO enforcement is configured per domain. Contact support to enable this feature for your organization.
Authorization with RBAC
Once authenticated, authorization determines what you can do within ABV. ABV uses Role-Based Access Control (RBAC) to manage permissions at both the organization and project levels.How RBAC Works in ABV
Organizations
Organizations are the top-level entity in ABV. An organization typically represents your company or team. Users are invited to organizations and assigned an organization-level role.
Projects
Projects exist within organizations and contain your traces, prompts, and evaluations. Users can have different roles in different projects within the same organization.
Roles & Permissions
Roles define what actions a user can perform. Permissions are granular and include actions like viewing traces, creating prompts, managing users, or configuring integrations.
Available Roles
ABV provides several predefined roles with different permission levels:Organization Owner
Organization Owner
Full control over the organization, including:
- Managing all projects
- Inviting and removing users
- Configuring SSO and authentication
- Managing billing and subscriptions
- Deleting the organization
Organization Admin
Organization Admin
Administrative access without billing control:
- Managing projects
- Inviting and removing users
- Configuring integrations
- Cannot manage billing or delete the organization
Project Admin
Project Admin
Full control within a specific project:
- Managing project settings
- Viewing and modifying all traces, prompts, and evaluations
- Managing project-level integrations
- Cannot invite users to the organization
Project Member
Project Member
Standard access to a project:
- Viewing traces, prompts, and evaluations
- Creating and editing content
- Cannot change project settings
- Cannot manage users
Project Viewer
Project Viewer
Read-only access to a project:
- Viewing traces, prompts, and evaluations
- Cannot create, edit, or delete content
- Cannot change any settings
Next Steps
RBAC Documentation
Detailed guide on managing users and permissions
Encryption
Learn how we encrypt data in transit and at rest
Penetration Testing
See how we test our security controls
Security Overview
Return to the security overview