Skip to content

Commit 91207eb

Browse files
author
Faxbot Agent
committed
docs(mkdocs/security): add Security index, OAuth/OIDC, and Network Hardening with HIPAA posture notes
1 parent d65141a commit 91207eb

File tree

3 files changed

+76
-0
lines changed

3 files changed

+76
-0
lines changed

mkdocs/docs/security/index.md

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
title: Security
3+
---
4+
5+
# Security
6+
7+
Secure defaults for keys, webhooks, storage, and Admin access.
8+
9+
## Keys
10+
11+
- Use API Keys with scopes; rotate regularly
12+
- Prefer OAuth/OIDC for Admin login where available
13+
14+
## Webhooks
15+
16+
- Enforce HMAC where supported (Phaxio, HumbleFax)
17+
- Use Basic auth for providers without signing (Sinch inbound)
18+
- Always use HTTPS
19+
20+
## Storage
21+
22+
- Tokenized, short‑TTL links for PDFs
23+
- S3/compatible storage supported; avoid public buckets
24+
25+
## HIPAA
26+
27+
- Execute BAA with cloud providers
28+
- Disable provider document retention
29+
- Avoid quick tunnels; use private tunnels and a permanent HTTPS domain
30+
31+
See also
32+
- [HIPAA Requirements](/HIPAA_REQUIREMENTS/)
33+
- [Networking & Tunnels](/networking/tunnels/)
34+

mkdocs/docs/security/network.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
---
2+
title: Network Hardening
3+
---
4+
5+
# Network Hardening
6+
7+
Lock down your deployment for production and PHI.
8+
9+
## Checklist
10+
11+
- [ ] Expose only HTTPS API port (8080)
12+
- [ ] Keep SIP/UDPTL private (self‑hosted)
13+
- [ ] Rate limit and WAF at edge
14+
- [ ] Disable Admin Terminal over public ingress
15+
- [ ] Use WireGuard/Tailscale for remote Admin access
16+
17+
See also
18+
- [Networking & Tunnels](/networking/tunnels/)
19+
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: OAuth / OIDC Setup
3+
---
4+
5+
# OAuth / OIDC Setup
6+
7+
Protect the Admin Console with your identity provider.
8+
9+
## Steps
10+
11+
1) Create an OAuth/OIDC app in your IdP (Auth0/Okta/etc.)
12+
2) Configure Redirect URI to your Admin domain
13+
3) Enter client id/secret in Admin → Settings → Security
14+
4) Test login from a private window
15+
16+
???+ tip "Scopes and claims"
17+
Map Admin roles from IdP claims if available. Keep Admin access limited to operators.
18+
19+
## Troubleshooting
20+
21+
- Invalid redirect → verify exact URI and HTTPS
22+
- Forbidden → check user group/role mapping
23+

0 commit comments

Comments
 (0)