Documentation

Security guardrails & troubleshooting

Map SSO/SAML/SCIM to Subprocess roles, enforce approvals for risky agent actions, and follow the troubleshooting checklist when a deployment pauses.

Identity guardrails

Subprocess treats SSO + SCIM as the source of truth. Enforce SAML for production tenants, restrict break-glass API tokens, and scope roles so operators only see the workspaces they own.

Step-up approval is triggered automatically when a deployment targets production or when an agent requests elevated network policies.

  • SAML metadata for prod + staging IdPs
  • SCIM sync cadence + webhook retries
  • Workspace pinning for regulated teams

Policy + approvals

Tie risky actions (deploy, drain, secret rotation) to approval workflows. Owners can require two-person review and export each decision to the immutable audit log.

Budget guardrails pair with runtime guardrails so platform and finance teams share one control surface.

  • Multi-step approvals with expiration
  • Slack/PagerDuty alert fan-out
  • Audit exports to S3/SIEM

Troubleshooting playbook

Use the deployment modal to confirm repo/CI/ticketing selections, then pivot into live logs. Integration statuses call out which connector is waiting or failed.

If a run stalls, retry from the task drawer—Subprocess replays the execution plan and re-runs CI/ticketing hooks with the same guardrails.

  • Log filters + downloadable transcripts
  • Task timeline with retries + approvals
  • Incident dashboard routed to chat/IR tools