PromptGuard Enterprise provides multi-tenancy, SSO, role-based access control, persistent audit logs, IP allowlisting, and custom billing — all built-in. No separate deployment needed.For custom Enterprise plans, contact us at enterprise@promptguard.co.
Enterprise Features Overview
What’s Included
| Feature | Description |
|---|---|
| Organizations | Team workspaces with role-based membership |
| RBAC | Owner, Admin, Member, Viewer roles with granular permissions |
| SSO (OIDC) | Single sign-on via Okta, Azure AD, Google Workspace, or any OIDC provider |
| Persistent Audit Logs | SOC 2-ready audit trail with integrity hash chain |
| GDPR Compliance | Data export and deletion endpoints |
| IP Allowlisting | Restrict API access to specific IP ranges |
| Webhook Signing | HMAC-SHA256 signatures for webhook verification |
| Custom Retention | Configure log retention per organization |
| Custom Rate Limits | Per-organization rate limit overrides |
| Idempotency Keys | Safe API retries via Idempotency-Key header |
Getting Started
1. Create Your Organization
2. Invite Team Members
3. Set Organization Context
All dashboard API calls accept theX-Organization-Id header to scope operations to your organization:
RBAC (Role-Based Access Control)
Role Hierarchy
| Role | Permissions |
|---|---|
| Owner | Full control: delete org, transfer ownership, manage billing |
| Admin | Manage members, billing, org settings, invite members |
| Member | Create/edit projects, manage API keys, configure policies |
| Viewer | Read-only: view projects, analytics, interactions |
Enforcing Roles
Roles are enforced server-side. No client-side bypasses possible:Enterprise Architecture
High-Availability Deployment
Load Balancer Configuration
Security Hardening
Network Security
Secret Management
RBAC Configuration
Compliance
Persistent Audit Logs (SOC 2)
All security-relevant events are persisted to theaudit_events table with tamper-resistant integrity hash chaining.
Querying interaction logs:
| Parameter | Description |
|---|---|
project_id | Filter by specific project ID |
flagged_only | Set to true to see only blocked/redacted events |
search | Free-text search for event reasoning |
days | Filter by last N days |
limit | 1-1000 |
integrity_hash (SHA-256) for tamper detection.
GDPR Compliance
Data Export (Right to Access):Monitoring and Observability
Enterprise Monitoring Stack
Custom Alerting Rules
Grafana Dashboards
Disaster Recovery
Backup Strategy
Disaster Recovery Runbook
Performance Optimization
Enterprise Performance Tuning
Auto-scaling Configuration
Integration Examples
Enterprise SSO Integration (OIDC)
PromptGuard supports OIDC-based SSO configured per organization. Compatible with Okta, Azure AD, Google Workspace, Auth0, and any OIDC-compliant provider. SSO Flow:- User visits
https://api.promptguard.co/dashboard/auth/sso/{org-slug}/authorize - PromptGuard redirects to IdP with PKCE challenge
- User authenticates at IdP
- IdP redirects back with authorization code
- PromptGuard exchanges code for tokens, retrieves user info
- User is auto-provisioned (if enabled) and logged in
organizations.settings.sso_config):
| Provider | Issuer URL Format |
|---|---|
| Okta | https://{domain}.okta.com |
| Azure AD | https://login.microsoftonline.com/{tenant}/v2.0 |
| Google Workspace | https://accounts.google.com |
| Auth0 | https://{domain}.auth0.com |
| Any OIDC | Any URL serving .well-known/openid-configuration |
Enterprise API Gateway Integration
Cost Optimization
Resource Planning
Usage Analytics Dashboard
Best Practices Summary
Security Best Practices
Security Best Practices
- Zero Trust Architecture: Verify every request and user
- Defense in Depth: Multiple security layers and controls
- Least Privilege: Minimal necessary access permissions
- Regular Audits: Automated compliance and security scanning
- Incident Response: Documented procedures and automation
Performance Best Practices
Performance Best Practices
- Horizontal Scaling: Auto-scaling based on metrics
- Connection Pooling: Efficient database and cache connections
- Caching Strategy: Multi-layer caching for optimal performance
- Resource Limits: CPU and memory constraints for stability
- Load Testing: Regular performance validation under load
Operational Best Practices
Operational Best Practices
- Infrastructure as Code: Version-controlled deployments
- Blue-Green Deployments: Zero-downtime releases
- Comprehensive Monitoring: Real-time metrics and alerting
- Automated Backups: Regular, tested backup procedures
- Documentation: Maintained runbooks and procedures
Compliance Best Practices
Compliance Best Practices
- Data Classification: Understand and protect sensitive data
- Audit Trails: Comprehensive logging and immutable records
- Regular Assessments: Scheduled compliance reviews
- Privacy by Design: Built-in privacy protections
- Vendor Management: Ensure third-party compliance
Support and Migration
Enterprise Support Channels
- 24/7 Support: Critical issue response within 1 hour
- Dedicated CSM: Assigned Customer Success Manager
- Architecture Review: Quarterly infrastructure assessments
- Training Programs: Enterprise security and operations training
- Migration Assistance: White-glove migration from existing solutions
Professional Services
- Custom Integration: Tailored integration with existing systems
- Security Assessment: Comprehensive security posture evaluation
- Performance Tuning: Optimization for enterprise workloads
- Compliance Consulting: Industry-specific compliance guidance
- Disaster Recovery Planning: Business continuity strategy development
Enterprise Portal
Access enterprise dashboard and management tools
Professional Services
Get white-glove setup and migration assistance
Security Center
Configure advanced security policies and monitoring
Compliance Hub
Manage regulatory compliance and audit requirements