Data Security
ai.TokenHub provides comprehensive data security to protect user privacy and business data.
Core Security Mechanisms
Zero Data Retention (ZDR)
Platform commits to not storing any detailed request/response content on servers.
- Pure Forwarding: Direct forwarding to upstream API providers
- No Log Retention: No logging of request content
- Immediate Destruction: Instantly clear temporary data after processing
User Request ──→ ai.TokenHub ──→ Upstream API
│
├── No request content stored
├── No response content stored
└── Only metadata loggedData Isolation
- Tenant Isolation: Complete data isolation between tenants
- Transport Encryption: Full TLS 1.3 encryption
- API Key Encryption: AES-256 encrypted storage
Security Features
Authentication & Authorization
json
{
"auth": {
"api_key": {
"encryption": "AES-256",
"rotation_support": true
},
"oauth": {
"supported": true,
"providers": ["google", "github", "microsoft"]
}
}
}IP Whitelist
json
{
"security": {
"ip_whitelist": {
"enabled": true,
"allowed_ips": [
"203.0.113.0/24",
"198.51.100.0/24"
]
}
}
}Two-Factor Authentication (2FA)
Supports TOTP authenticator for additional account protection.
- Google Authenticator
- Authy
- Recovery code backup
Compliance
| Item | Description |
|---|---|
| GDPR Compliant | EU General Data Protection Regulation |
| Data Localization | Regional data storage support |
| Audit Logs | Complete operation audit records |
| Privacy Policy | Transparent privacy policy |
Security Best Practices
For Users
- Protect API Keys: Never hardcode in client code
- Enable 2FA: Add two-factor authentication
- IP Whitelist: Enable IP restrictions for production
- Regular Rotation: Periodically rotate API Keys
- Monitor Logs: Regularly check API usage records
For Enterprises
- Sub-account Isolation: Create separate sub-accounts per department
- Least Privilege: Grant permissions as needed
- Quota Control: Set reasonable quota limits
- Audit Compliance: Enable complete audit logs
Responding to Security Incidents
If you discover security issues or API Key leaks:
- Immediate Disable: Delete suspicious API Keys in dashboard
- Generate New Key: Create new API Key
- Check Logs: Review for unusual usage
- Contact Support: If needed, contact technical support