| Component | Purpose |
|---|---|
| Policies | Standardize environments and agent behavior across projects |
| SSO | Central authentication and access management |
| OIDC | Short-lived, claim-based access to cloud resources |
| Audit logs | Track actions for compliance and incident response |
| Command deny list | Block risky commands from executing |
Before you start
- Ensure you are an organization admin
- Choose an identity provider and decide SSO posture
- Connect runners to your organization
- Review policy options and decide rollout scope