Skip to main content
All CollectionsQuestions on Security, Reliability, Data Protection, and IntegrationSecurity
How are endpoints mutually authenticated in machine-to-machine communication?
How are endpoints mutually authenticated in machine-to-machine communication?

Integration

S
Written by Support legal-i
Updated over a week ago

The legal-i agent component is deployed on-premises. Authentication with the legal-i cloud is performed using a secret key, which can be rotated by the customer. IP whitelisting is also possible. Authentication is done via Auth0 (IDP provider).

Did this answer your question?