Platform Overview
Understand the PRUDENZE architecture — seven modules, one identity layer, one audit trail. Start here before evaluating individual modules.
DOCUMENTATION
Architecture references, deployment guides, and integration specifications for engineering and compliance teams.
Understand the PRUDENZE architecture — seven modules, one identity layer, one audit trail. Start here before evaluating individual modules.
Docker Compose, Kubernetes Helm chart, and Azure Container Apps deployment. One .env.template with every configuration value documented.
Cryptographic specifications, audit log schema, JWT structure, and regulatory alignment documentation.
View Security DocsARCHITECTURE
LAYER 0 — IDENTITY
Every human and AI agent authenticates here first. Issues the platform JWT accepted by all modules. SSO, MFA, RBAC, AI agent API key governance.
LAYER 1 — EXECUTION FIREWALL
GO/NO-GO authorization before any AI agent action executes. Sub-200ms. MCP-native. Six policy rule types. Immutable decision trail.
LAYER 2 — COMPLIANCE & RECORD
Lifecycle policy gates and credit decision records. Ed25519-signed rules. Hash-chained audit log. Cryptographic decision hashes. On-premises.
LAYER 3 — OPERATIONS & INTELLIGENCE
AP automation, AI model safety, and portfolio intelligence. Full audit trail built in. AI assists — never enforces.
API
/v1/authorizeGuardian execution authorization. Submit an agent action for GO/NO-GO evaluation.
Request
agent_id, action_type, amount, metadataResponse
decision (GO/NO-GO/EXCEPTION), policy_matched, decision_hash, latency_ms/v1/policy-checkComply lifecycle gate evaluation. Submit a customer file for verdict.
Request
entity_id, lifecycle_stage, entity_type, profile_dataResponse
verdict (APPROVE/REVIEW/ESCALATE), rule_id, signature, narrative, audit_entry_id/functions/v1/issue-platform-jwtIdentity JWT issuance. Exchange a validated Supabase session for a platform JWT.
Request
Authorization: Bearer supabase_tokenResponse
platform_token, expires_in, licensed_modules[]/v1/audit/exportUnified audit export. Pull tamper-evident audit records across any module.
Request
tenant_id, module, date_from, date_to, format (CSV/JSON)Response
signed audit entries, entry_hash chain, export_hashDEPLOYMENT
Estimated time: 2-4 hours
Estimated time: Under 2 hours
Estimated time: Under 30 minutes
Complete API specifications, deployment playbooks, security architecture documentation, and integration guides are available to qualified engineering and compliance teams.