All API requests to Helix Enterprise are authenticated with a Bearer token. Tokens are managed
through the Helix dashboard. Include the token in the Authorization header of every request:
Authorization: Bearer <token>
Requests without a valid token are rejected at the gateway before reaching any database node.
Token rotation and revocation are performed in the dashboard with immediate effect.
Scoped API keys with role-based permissions - read-only, read-write, or restricted to specific
stored queries - allowing least-privilege credentials for each service or environment.Contact founders@helix-db.com to discuss RBAC requirements for
your cluster.
SSO and SAML integration for dashboard access, enabling teams to manage Helix users through an
existing identity provider (Okta, Azure AD, Google Workspace, etc.) with centralized provisioning
and deprovisioning.Contact founders@helix-db.com to discuss SSO requirements for
your organization.
All traffic between clients and the gateway is encrypted in transit via TLS. Data at rest in
object storage is encrypted using the storage provider’s server-side encryption.
For workloads that require traffic to remain entirely within the AWS network, PrivateLink creates
a private endpoint in your VPC that routes to Helix Enterprise without traversing the public
internet. This eliminates exposure to internet-based threats and satisfies network isolation
requirements common in regulated environments.Contact founders@helix-db.com to discuss PrivateLink
configuration for your cluster.