Security & Privacy
Intellitoggle is designed with security and privacy in mind. This page explains how feature flag evaluations, API requests, and developer integrations are secured.
1. Data Handling
-
Feature flag evaluations are stateless and performed securely.
-
Context attributes are only used for evaluation; they are not persisted.
-
Sensitive fields can be marked as
privateAttributesto exclude them from logs and telemetry.
{
"targetingKey": "user-123",
"plan": "enterprise",
"privateAttributes": ["email", "phone"]
}
2. Transport Security
-
All SDK and API communication is encrypted using TLS (HTTPS).
-
Development mode allows
http://localhostfor testing only. -
Certificates must be valid and trusted in production deployments.
3. Authentication & Authorization
-
All SDKs and APIs require a valid API key or OAuth2 client secret.
-
Tokens are time-bound with configurable TTL (default: 60 minutes).
-
Automatic token refresh occurs with a 10-minute buffer before expiry.
-
Multi-tenancy is enforced via the
X-Tenant-IDheader on all requests.
headers: {
'Authorization': 'Bearer $token',
'X-Tenant-ID': tenantId,
}
4. Privacy Controls
-
Anonymous contexts are supported (
"anonymous": true) for non-identifiable targeting. -
Use
privateAttributesto prevent sensitive data from being exposed in logs. -
No Personally Identifiable Information (PII) is stored by default.
-
Attribute minimization is encouraged — send only what is necessary for flag evaluation.
5. Compliance
Intellitoggle is designed to support compliance with common standards:
-
GDPR: Developers control which attributes are transmitted.
-
SOC2: Operational and security best practices followed.
-
HIPAA (if applicable): Use caution with protected health information (PHI).
Future compliance certifications will be published on the Intellitoggle website.
6. Best Practices for Developers
-
Avoid sending raw PII (e.g., emails, phone numbers) as evaluation attributes.
-
Use
privateAttributesfor sensitive fields that must be sent. -
Rotate API keys and OAuth client secrets regularly.
-
Use environment-specific credentials (development, staging, production).
-
Enable TLS everywhere outside local development.