Axya prioritizes security as a fundamental aspect of our platform. We've implemented various measures to ensure the safety and protection of your data. As a testament to our commitment, Axya is proud to be SOC2 Type 2 certified.
If you require our SOC2 certificate for your records, please don't hesitate to request it by emailing us at
security@axya.co
.
Axya supports Single Sign-On (SSO) using Security Assertion Markup Language (SAML). SSO offers a convenient way to authenticate users, allowing customer administrators to authorize access through their existing identity provider or SSO solution. This integration streamlines access management and enhances security.
Our platform employs role-based access control (RBAC) to ensure precise authorization separation. Strict permissions are defined for different roles, such as buyers, suppliers, and administrators. This ensures that each role has appropriate access levels, enhancing data security.
Axya utilizes strong authentication and authorization methods to safeguard critical identity data. Passwords are securely hashed and salted using industry-standard algorithms. In addition, network communication is protected using TLS encryption with AES encryption.
We prioritize your security by offering Two-Factor Authentication (2FA). This extra layer of protection requires a second form of verification during login. 2FA significantly reduces the risk of unauthorized access, enhancing the security of your accounts and sensitive information.
Dependable service is crucial, and at Axya, we maintain an uptime of 99.8% or higher. This ensures that our platform remains accessible and available for your needs, allowing you to concentrate on your tasks without interruptions.
All on going indidents can be tracked under https://axya.instatus.com/en
Axya places a strong emphasis on the security of your cloud data. To achieve this, we've selected secure AWS cloud services as our trusted infrastructure provider. Our cloud environment adheres to recommended secure practices advocated by AWS, bolstering the overall security of our platform and providing you with a reliable cloud-based solution.
Axya ensures that all customer data is stored exclusively within Canada. This means that your data remains within the Canadian borders, providing assurance that it adheres to data protection regulations while also offering you transparency and control over where your information is hosted.
All Axya customers data is hosted exclusively within Canada.
Axya offers a powerful feature that enhances the efficiency of interactions between buyers and suppliers without the need for authentication. Through tokenized URLs utilizing UUID 4 (Universally Unique Identifier version 4), we provide a seamless and secure method for sharing public links that enable smooth collaboration.
Tokenized URLs are specially crafted web links that include a unique token generated using UUID 4. UUID 4 is a widely recognized and secure method for generating random identifiers. These URLs allow users to access specific resources or actions within Axya without the requirement of authentication. They are particularly useful for enabling easy communication and collaboration between buyers and suppliers, enhancing workflow efficiency.
Effortless Interaction: Tokenized URLs eliminate the need for users to log in, streamlining the interaction process. Buyers and suppliers can directly access the shared resources or actions through the provided link.
Enhanced Collaboration: By sharing tokenized URLs, users can seamlessly collaborate on tasks, share information, and communicate without the delay of authentication steps.
Secure and Time-Limited Access: The UUID 4 token ensures a high level of security. Additionally, tokenized URLs can be configured with time limits, allowing temporary access to specific resources.
Customizable Access Control: Axya provides flexibility in defining the scope of access granted through tokenized URLs. This means you can customize the level of interaction between buyers and suppliers based on your requirements.
Our SAAS application is hosted exclusively in the Canada central region. We have multi-availability zone enabled to ensure high availability and fault tolerance of our services. Our geolocation choice is in alignment with legal requirements. Additionally, our hosting location also meets any specific requirements that may be applicable to our customers' industries or regions.
Yes, we use encryption for data in both application and infrastructure components, both in transit and at rest. For data at rest, we use server-side encryption with AWS KMS for S3 and TDE for RDS, and client-side encryption for sensitive data. For data in transit, we use TLS and SSL encryption.
We maintain an uptime of 99.8% or higher, ensuring that our platform remains accessible and available for your needs.
Yes, our Authentication management is compatible with SSO, including the SAML 2.0 Protocol. We use Keycloak as the Identity broker. Note that a custom integration is required to enable it.
Yes, we have separate environments for test/development, integration, and production systems in place. This allows us to maintain a controlled and secure development process, minimizing the risk of issues or errors that could impact our customers.