Skip to content

Authentication

Authentication protects CORTEX public interfaces and tenant-specific surfaces. Public documentation explains the concept and boundaries; tenant credentials and implementation internals are handled during onboarding.

Customer systems increasingly delegate access to automation and integration layers. CORTEX authentication must make clear which actor, tenant and capability is authorized before any data is consumed or output is exposed.

Authentication may use tenant identity, user identity, issued access tokens, scopes, expiry information and consent or entitlement state. Customer-specific secrets are never documented in public pages.

A successful authentication flow allows a permitted caller to use approved public interfaces. A failed flow returns a boundary response that explains the access issue without revealing internal infrastructure.

Authentication verifies identity and permission for the requested surface. It does not verify the business validity of a downstream decision output; that belongs to the module evidence boundary.

This page does not document internal key stores, deployment details, private headers or infrastructure names. It also does not create tenant access by itself. Tenant access is issued through the CORTEX onboarding process.