Security Overview
Tiquo implements enterprise-grade security across all layers of the platform, from authentication to data storage.Authentication
Clerk Integration
Tiquo uses Clerk for authentication, providing:Session Management
Secure, short-lived sessions with automatic refresh
Multi-factor Auth
SMS, authenticator app, and backup codes
Social Login
Google, Apple, Microsoft, and more
Enterprise SSO
SAML and OIDC for enterprise customers
Authentication Flow
1
User Signs In
User authenticates via Clerk’s hosted UI or embedded components
2
Session Created
Clerk creates a signed JWT with user and organization claims
3
Token Validation
Each request validates the JWT signature and expiration
4
Context Established
User identity and organization are available in all server functions
Authorization
Organization-based Access
All data is isolated by Clerk organization:| Level | Scope | Description |
|---|---|---|
| Organization | Tenant | Complete data isolation between organizations |
| Location | Sub-tenant | Location-level access control |
| User | Individual | Role-based permissions within organization |
Role-based Access Control
Owner
Owner
Full administrative access:
- Manage billing and subscription
- Add/remove organization members
- Delete organization
- Access all data and settings
Admin
Admin
Administrative access without billing:
- Manage team members
- Configure all settings
- Access all operational data
- Manage integrations
Manager
Manager
Location-level management:
- Manage assigned locations
- View location analytics
- Manage staff schedules
- Handle customer escalations
Staff
Staff
Day-to-day operations:
- Create and manage bookings
- View and edit customers
- Process payments
- Access assigned resources
Viewer
Viewer
Read-only access:
- View dashboards and reports
- View customer information
- No edit capabilities
Permission Checks
API Security
API Key Management
Tiquo provides API keys for programmatic access:Scoped Permissions
Keys can be limited to specific operations
Rate Limiting
Per-key rate limits prevent abuse
Audit Logging
All API calls are logged for compliance
Key Rotation
Easy key regeneration without downtime
API Key Scopes
| Scope | Access |
|---|---|
customers:read | Read customer data |
customers:write | Create and update customers |
orders:read | Read order data |
orders:write | Create and manage orders |
analytics:read | Access analytics and reports |
settings:read | Read organization settings |
settings:write | Modify organization settings |
Rate Limiting
| Tier | Rate Limit | Burst |
|---|---|---|
| Free | 100 req/min | 10 |
| Pro | 1,000 req/min | 100 |
| Enterprise | 10,000 req/min | 1,000 |
Data Protection
Encryption
In Transit
In Transit
- TLS 1.3 for all connections
- HTTPS enforced across all endpoints
- Certificate pinning on mobile apps
At Rest
At Rest
- AES-256 encryption for stored data
- Encrypted backups
- Key management via cloud provider HSM
Secrets Management
Secrets Management
- Environment variables for sensitive config
- No secrets in source code
- Automatic secret rotation support
Data Retention
| Data Type | Retention | Notes |
|---|---|---|
| Active Data | Indefinite | While account is active |
| Deleted Records | 30 days | Soft delete, then permanent |
| Activity Logs | 90 days | Audit and compliance |
| Analytics | 2 years | Aggregated, anonymized |
| Backups | 30 days | Point-in-time recovery |
Webhook Security
Signature Verification
All outgoing webhooks include a signature for verification:Verification Example
Infrastructure Security
Hosting
Vercel
- SOC 2 Type II compliant
- GDPR ready
- Automatic SSL certificates
- DDoS protection
Convex
- SOC 2 Type II compliant
- Encrypted at rest
- Point-in-time recovery
- Multi-region replication
Network Security
- All traffic over HTTPS
- IP allowlisting available for Enterprise
- WAF protection against common attacks
- Regular security scanning
Compliance
Standards
| Standard | Status |
|---|---|
| GDPR | Compliant |
| SOC 2 Type II | Via hosting providers |
| PCI DSS | Via Stripe |
| CCPA | Compliant |
Data Subject Rights
Tiquo supports GDPR data subject rights:Right to Access
Right to Access
Export all data associated with a customer or user
Right to Rectification
Right to Rectification
Correct inaccurate personal data
Right to Erasure
Right to Erasure
Delete personal data upon request
Right to Portability
Right to Portability
Export data in machine-readable format
Security Best Practices
1
Enable MFA
Require multi-factor authentication for all team members
2
Use Least Privilege
Assign the minimum role needed for each team member
3
Rotate Keys Regularly
Regenerate API keys on a regular schedule
4
Monitor Activity
Review audit logs for suspicious activity
5
Keep Software Updated
Update mobile apps and integrations regularly
Reporting Security Issues
If you discover a security vulnerability:- Do not disclose it publicly
- Email [email protected]
- Include detailed reproduction steps
- Allow us time to investigate and fix
- Acknowledging reports within 24 hours
- Providing updates on investigation progress
- Crediting reporters (if desired) after fix
For general support questions, contact [email protected].