Security & Governance
The tSM platform delivers enterprise-grade security and governance features to ensure that access, data, and processes remain safe and transparent.
User Security
ℹ️ Enhancements available from V2.4 onwards
While most production deployments rely on SSO (Single Sign-On) and corporate identity providers, tSM also includes an internal user database. Although rarely used in production, the internal database is maintained with additional security measures for deployments that require it.
tSM protects access to the platform through:
- SSO-first architecture – in production, almost all customers use external identity providers for authentication. New SSO providers will be added.
- Secure internal accounts – where internal user DB is used (for isolated deployments or testing). We will add stricter policies for passwords, login management, and session handling.
- Configurable session management – administrators can set timeouts and session policies to align with organizational security standards.
This ensures that every deployment — whether SSO or local — is secure and compliant.
Permissions
ℹ️ Fine-grained permissions on custom attributes planned for future releases beyond V2.4.
tSM offers a flexible permission framework that already governs access at entity and attribute levels.
The roadmap extends this by allowing administrators to:
- Secure encoding on characteristics – sensitive values can be stored encrypted at the characteristic level, ensuring that even field-level data (such as credentials, tokens, or personal identifiers) remains protected.
- Restrict access to sensitive fields at a very granular level.
- Apply governance policies consistently across both standard and extended data models.
This gives organizations complete control over who can see and modify what inside the platform.
User Statistics
ℹ️ Available from V2.4
tSM provides administrators with visibility into user activity and adoption:
- Last login times – track system access by user.
- Active session data – measure time spent working in the application.
- Usage patterns – detect inactive accounts or unusual login behavior.
This information helps both in governance and in optimizing operations.
Audit & Logs
ℹ️ Available from V2.4, continuously improving visibility
tSM already audits all actions across the system. Every change, process execution, and configuration update is recorded.
Today, not all audit data is fully exposed in the UI or presented in a way that is easily consumable by business users. The ongoing work is focused on:
- Improving visibility – making audit data more accessible in the user interface.
- Simplifying consumption – providing summaries and filterable overviews, so business users can understand what happened without needing technical interpretation.
The auditing itself is complete; the enhancements are focused only on presentation and usability.
Vision
Security & Governance in tSM continues to evolve beyond V2.4 with:
- Stronger field-level governance for custom attributes.
- Improved UI presentation of audit data, making it more business-friendly.
- Ongoing SSO-first security model, with secure fallback for special cases.
This ensures that tSM remains both secure by design and transparent in daily operation, meeting enterprise governance requirements without compromising flexibility.