Security
TIR AI platform ensures that access to sensitive systems and data is tightly controlled through robust authentication methods. It provides two core security mechanisms to manage and protect access to your resources: Personal Access Tokens and SSH keys.
- Personal Access Tokens authenticate requests between your applications or services and the TIR platform, ensuring only authorized clients can interact with the API.
- SSH keys enable secure, encrypted access to remote instances, allowing safe server management and file transfers.
API TokensSSH KeysPasswordless AccessCI/CD Ready