Links

Security & Privacy

Data Privacy

Private by design

When logging into the Forest Admin UI in your browser, you will connect to:
  1. 1.
    the Forest Admin servers to retrieve the Forest Admin layouts configuration,
  2. 2.
    the Agent to retrieve your data and populate the Forest Admin UI with it.
As your data is transmitted directly from the Agent hosted on your end and the user browser, it never transits through our servers.

No third-party vendor tracking

Whatever your project plan (free or paying plan), Forest Admin guarantees the respect of data privacy.
In addition, Forest Admin provides an option to completely disable any third-party vendors that could track metadata of your activity available from your browser.
You need to be on a Forest Admin Pro plan ↗ to have access to this feature.

Security

Tokens

The connection to both the Agent and the Forest Admin Servers are protected using 2 different JWT signed by 2 different keys:
  1. 1.
    FOREST_ENV_SECRET to authenticate all requests made to the Forest Admin Servers
  2. 2.
    FOREST_AUTH_SECRET to authenticate all requests made to the Agent
FOREST_ENV_SECRET is provided by Forest Admin and ensures your Agent interacts with the relevant environment configuration on Forest Admin servers.
FOREST_AUTH_SECRET is chosen freely by you and is unknown by Forest Admin.
Both secrets must never be disclosed to anyone.
The JWT Data Token contains all the details of the requesting user. On any authenticated request to your Agent, you can use that information to implement custom behaviors.
{
"id": "172",
"email": "[email protected]",
"firstName": "Angelica",
"lastName": "Bengtsson",
"team": "Pole Vault",
"role": "Manager",
"tags": [{ "key": "country", "value": "Sweden" }],
"renderingId": "4998",
"iat": 1569913709,
"exp": 1571123309
}

IP Whitelisting

The IP whitelisting ↗ feature allows you to create a list of trusted IP addresses or IP ranges from which your admin users can both access to the Forest Admin UI and interact with your Agent.

DMZ & VPN

You're free to host your Agent in the cloud architecture you want to be compliant with your security infrastructure (DMZ, VPN, etc.).

Credentials

We’re already working with companies compliant with the following Industry Standard Certifications.
Last modified 1mo ago