Skip to main content
Adaline is built with enterprise security requirements at its foundation. From data encryption to access auditing, every layer of the platform is designed to protect your AI workflows and the data flowing through them.

Authentication methods

Adaline supports multiple authentication methods to fit different access patterns across your organization.

Email and password

Members can sign in with an email and password directly through the Adaline dashboard.
The work email only restriction has been lifted! You can now sign up for Adaline with your personal email.

Single sign-on (SSO)

Adaline supports Google Suite SSO out of the box for all plans. Your team can sign in with their existing Google credentials without any additional configuration. For organizations that need SAML 2.0, the following providers are supported:
  • Okta Workforce
  • Microsoft Entra ID
  • Google Workspace
  • Custom SAML provider
OpenID Connect (OIDC) is also supported for organizations using a compatible identity provider.
SAML and OIDC are available on Enterprise plans. Contact support@adaline.ai to get started.

API keys

API keys provide programmatic access to the Adaline API and SDKs. Each key inherits the permissions of the member who created it. Keys are stored as one-way cryptographic hashes and cannot be recovered after creation. See Create API keys for setup instructions.

Service accounts

Service accounts provide a way to authenticate automated systems and integrations independently of individual team members. They are well suited for CI/CD pipelines, scheduled evaluation runs, and production monitoring where access should persist regardless of team changes. When generally available, service accounts will support scoped permission groups, credential rotation, and detailed usage audit trails — giving your team full control over how automated systems interact with Adaline.
Service accounts are currently in beta and will be generally available soon. Contact support@adaline.ai for private preview access.

Audit logging

Adaline maintains a comprehensive audit log of all significant actions across your workspace. Audit logs provide a tamper-resistant record that supports internal reviews, incident investigations, and compliance reporting. Audit logs are retained according to your plan’s retention policy. Enterprise customers can configure extended retention periods and export logs to external systems.

Vulnerability reporting

If you discover a security vulnerability in Adaline, please report it responsibly through our vulnerability disclosure page. We investigate all reports and work to remediate confirmed vulnerabilities promptly.