FAQ
These answers provide implementation detail for developers and technical buyers.
Default deployment is AWS. We also support on-prem and hybrid installs using containerized agents (Docker or Kubernetes). Network egress and data residency are customer controlled, and the same governance and audit stack is available in all footprints.
By default, no customer content leaves your environment. GENIE™ can operate in a zero retention mode or a customer defined retention mode. All traffic between agents and systems is encrypted in transit. At rest, customer data stays in your environment unless you explicitly opt in to storage for analytics or reporting.
Secrets and credentials: Stored in your enterprise vault such as AWS KMS and Secrets Manager, Azure Key Vault, or HashiCorp Vault. GENIE™ references secrets by handle. Credentials are never kept in plain text or embedded in model context.
Access scopes: Agents authenticate with short-lived, least-privilege tokens that map to each agent’s Passport.
Redaction and hashing: Sensitive fields can be redacted before any model call. Field level hashing supports record linkage without exposing raw values.
Audit metadata: Each action records agent ID, Passport version, tool invoked, resource identifier, micropolicy or policy ID, pre and post checksums, justification string, timestamp, and reviewer ID when human review is required.
Key management: Supports customer managed keys. Rotation policies are enforced by your KMS and reflected in Passport checks.
Each tenant runs isolated agent workloads. We support per-org namespaces, dedicated clusters, and air-gapped installs. Policies, logs, and credentials are segmented at the tenant boundary.
GENIE™ connects through a catalog of reusable tools and a dynamic registry that discovers approved additions without rebuilds.
• Supported interfaces: REST and GraphQL APIs, JDBC and ODBC data sources, object storage, common SaaS endpoints, and message queues.
• Examples: Major clouds (AWS, Azure, GCP), identity providers (Okta, Entra, OIDC, SAML), data stores (PostgreSQL, Snowflake, S3, Azure Blob, GCS, SharePoint), and security or ops systems (Elastic, Splunk, ServiceNow).
• Generic connector: A generic REST or webhook connector covers most custom systems.
• New connector path: Import schema, scaffold a tool, declare the allow list and scopes, validate in a sandbox, then register it in the dynamic registry.
Typical timelines are hours for standard connectors and 1 to 3 days for custom REST or OpenAPI integrations depending on authentication and approval flows. Teams can parallelize builds because registry updates are hot loaded.
Yes, via the edge agent. MQTT and OPC-UA are supported through pluggable connectors. Protocol coverage is deployment specific.
Yes. The Open API and connector SDK let you add tools while keeping them under governance through the Agent Passport. Scoped permissions, audit, and policy controls are enforced for each tool.
SSO via SAML 2.0 or OIDC with MFA enforced by your IdP. We avoid long-lived passwords. Agents use short-lived, least-privilege tokens with rotation and expiry.
The Passport is a signed manifest that defines an agent’s identity, permissions, and approval gates.
• Identity fields: Agent UUID, owner, environment, version, and signature.
• Permission model: Tool allow list, data scopes, rate and spend limits, workflow permissions, and escalation rules.
• Approval gates: Actions can require one or two human approvers based on risk tier. Break glass operations are time boxed and logged with reason codes.
• Change control: Passport updates are proposed via change requests, reviewed, signed, and versioned. Rollback returns the prior Passport version immediately.
• Tamper evidence: All Passport reads and writes are logged. Hashes allow external verification in your SIEM.
Yes. Fine grained RBAC and ABAC controls restrict which actions each role can invoke. Sensitive actions can require multi party approval.
Configure prompt and tool allow lists, retrieval isolation, output filtering, execution sandboxes, egress controls, and rate limits. All interactions are logged in a tamper evident way.
SSO via SAML 2.0 or OIDC with MFA enforced by your IdP. We avoid long-lived passwords. Agents use short-lived, least-privilege tokens with rotation and expiry.
The Passport is a signed manifest that defines an agent’s identity, permissions, and approval gates.
• Identity fields: Agent UUID, owner, environment, version, and signature.
• Permission model: Tool allow list, data scopes, rate and spend limits, workflow permissions, and escalation rules.
• Approval gates: Actions can require one or two human approvers based on risk tier. Break glass operations are time boxed and logged with reason codes.
• Change control: Passport updates are proposed via change requests, reviewed, signed, and versioned. Rollback returns the prior Passport version immediately.
• Tamper evidence: All Passport reads and writes are logged. Hashes allow external verification in your SIEM.
Yes. Fine grained RBAC and ABAC controls restrict which actions each role can invoke. Sensitive actions can require multi party approval.
Configure prompt and tool allow lists, retrieval isolation, output filtering, execution sandboxes, egress controls, and rate limits. All interactions are logged in a tamper evident way.
AI Governance, Data Governance, Privacy, and Cybersecurity.
Yes. Creation is self service. Limits and pricing depend on package tier. Enterprise can be unlimited.
No model training is required. Agents use policies and your SOPs. You can extend them via configuration and connector permissions.
Risk scoring combines rule violations, severity, and asset criticality. Maturity can map to frameworks such as NIST, ISO 27001 and 27701, CIS Controls, and the EU AI Act.
Immutable audit logs that differentiate AI and human actors, compliance scorecards by system and regulation, and planned ROI dashboards such as cost or time saved and violation reduction. Exports include PDF, CSV, and JSON.
Yes, on a schedule or on demand, with notifications and API or webhook delivery.
The Developer tier is capped by package using rate limits and monthly allotments. Enterprise tiers raise or remove caps.
Primarily the number of AI tokens available, which impacts the number of actions and the size of the content that can be handled. With more tokens you can process more and larger documents, policies, and reports.
All licensed users can access GENIE™. Capabilities are role based. Admins manage policies and approvals.
Quick start guides, admin runbooks, and optional live training. Enterprise includes white glove onboarding and solution architect support.
Yes. Full docs cover agent configuration, API and connector setup, and permission management.
FAQ
The i-GENTIC API is the integration layer of the i-GENTIC compliance platform. It transforms static regulations into micropolicies, binds them to agents, and enforces them continuously. Every action is captured as immutable evidence: scorecards for organizations and passports for agents. This is not just another SaaS API, it is a governance operating system.
The API is the integration layer of the i-GENTIC compliance platform. It is REST first and JSON over HTTPS, with synchronous CRUD endpoints and asynchronous task handling. It provides programmatic access to user management, project lifecycle, policy ingestion, agent orchestration, reporting, and auditing.
The API provides REST first, JSON over HTTPS access to:
• Projects → Governance Programs
• Policies and Micropolicies → Machine enforceable compliance rules
• Agents → Autonomous compliance actors
• Reports → Audit scorecards
• Teams → RBAC and segregation of duties controls
• Admin Logs and Alerts → Immutable audit trails and early warnings
Endpoints are synchronous for CRUD, with asynchronous task handling for long running operations.
• Authentication is via Bearer tokens at /auth/token.
• Tokens include organization, user, and role metadata.
• Tokens must be rotated every 90 days.
• Roadmap version 2: OAuth2 and JWT with scoped access.
See the central Authentication section for details.
RBAC is applied system wide to enforce least privilege:
• Each token is bound to a role such as Super Admin, Admin, or User.
• The permission matrix at /admin/permission-matrix is exportable as audit evidence.
• Role assignments and changes are logged to support regulatory audits.
Agents are not just scanners. They are evergreen compliance actors that enforce micropolicies in real time, accept plain language prompts or structured definitions, call external tools, track historical violations for escalation, and produce an agent passport that records actions and decisions.
Endpoints:
• Create → /agents
• Orchestrate → /tasks/scan, continuous monitoring, or webhook triggers
Micropolicies are JSON objects representing enforceable rules derived from regulations such as “Encrypt PHI at rest.”
• Created with /policies/ingest
• Traceable to source regulation for audit evidence
• Schema definitions will be published in version 2
Endpoints:
• Create → /agents
• Orchestrate → /tasks/scan, continuous monitoring, or webhook triggers
Tools are compliance enforcement utilities that agents can invoke. Examples:
• AWS IAM scanner checks least privilege
• Okta RBAC checker validates role segregation
• PII detector redacts sensitive fields
Planned endpoint: /tools
Endpoints:
• Create → /agents
• Orchestrate → /tasks/scan, continuous monitoring, or webhook triggers
The Prompt API defines how agents enforce compliance:
• Natural language such as “If PHI is detected, redact and notify”
• Structured JSON logic for if or then enforcement
• Roadmap: /prompts endpoint for versioned prompt management
Endpoints:
• Create → /agents
• Orchestrate → /tasks/scan, continuous monitoring, or webhook triggers
curl -X POST https://api.igenticai.com/v1/policies/ingest \
-H “Authorization: Bearer igpk_abc123” \
-F file=@hipaa.pdf
Accepted formats: PDF, DOCX, TXT. Parsed micropolicies become immediately available for agents.
/reports/{id} returns JSON scorecards including:
• Compliance scores
• Violations detected
• Audit evidence traceable to source micropolicies
Reports are designed for regulator ready submission.
Asynchronous tasks return 202 Accepted with a Location header at /tasks/{id}. Webhook notifications are supported. Retries use exponential backoff and dead letter handling is documented.
Standard JSON error format:
{
“error”: {
“code”: “VALIDATION_ERROR”,
“message”: “Phone number invalid”,
“fields”: [“phone”]
}
}
Status codes:
• 400 = Validation failed
• 401 = Unauthorized
• 403 = Forbidden
• 404 = Not found
• 409 = Conflict
• 500 = Internal error
Delete endpoints are soft deletes. Data is hidden from active use but preserved in the database for auditability. Permanent delete is not exposed in version 1.
• cURL accessible OpenAPI 3.0 spec in version 1
• Roadmap: Postman collections and SDKs for Python, Node, and Java
Planned enhancements:
• OAuth2 and JWT with scoped access
• Tool and Prompt APIs
• Agent Passport endpoints
• JSON Schemas for micropolicies, scorecards, and violations
• Changelog driven deprecations with 90 day windows
The i-GENTIC API is not just an integration layer. It is a governance operating system. It converts static regulations into enforceable micropolicies, deploys them via agents, enforces continuously, and provides immutable audit records.
Agents provide continuous enforcement:
• Monitor systems in real time
• Remediate violations automatically
• Record every decision in an auditable passport
• Maintain historical memory for escalation of repeat issues
The passport is the audit identity of an agent:
• Policies enforced
• Tools used
• Actions taken
• Violations found
• Remediation outcomes
It is exportable for internal audits or regulators.
A micropolicy is a single compliance rule derived from a larger regulation. Instead of a 200 page HIPAA document, you get hundreds of micropolicies such as “PHI must be encrypted at rest” or “Logs must retain user IDs for 12 months.” Each micropolicy is traceable back to its source regulation for audit purposes.
Tools are integrations that let agents act on violations. For example, a redaction tool can mask PHI, or a sanctions API can check transactions against blacklists. This ensures violations are not just reported but actively remediated.
Prompts let compliance teams define real time enforcement logic without coding.
• Immutable logs of every action
• Soft deletes to preserve history
• Permission matrices for role audits
• Alerts for governance breaches
• Reports and Passports for evidence
When regulations change:
• New documents are ingested and new micropolicies are created
• Agents adopt updated policies automatically
• No manual rewrites are required
The system targets 99.5 percent uptime per month excluding four hours of scheduled maintenance. Support response is available within four hours.
Reports include compliance scorecards, violation logs, and remediation records. These can be exported for internal compliance dashboards or submitted directly as audit evidence.
RBAC enforces least privilege. Role assignments are logged and auditable. The permission matrix provides a complete map of who can access what, which is critical for regulatory audits.
Agents track historical violations and actions, enabling escalation for repeat issues and avoiding duplicate alerts. This provides context to regulators that issues were not only detected but addressed consistently over time. GENIE™, our AI based digital assistant, has a memory system that learns over time and provides additional context from prior events to answer questions better.
FAQ
Yes. Organizations can sign up for a free trial of the i-GENTIC Developer API. The trial provides access to the core set of endpoints including regulation ingestion, micropolicy parsing, agent creation, and reporting. To activate the trial, a valid credit card must be added at signup. No charges are made during the trial period, but billing details are required to ensure a seamless transition to a paid subscription if the account is upgraded.
The free trial has limited capacity and features. Trial accounts may support a small number of agents such as two active agents, capped API calls per month, and restricted webhook delivery. Paid subscriptions unlock unlimited agents, higher API throughput, advanced reporting, custom tool integration, SLA backed uptime, and dedicated support. Paid tiers may also include advanced features such as Agent Passports, full audit logs, RBAC customization, and enterprise IdP integration.
Usage is measured by API call volume, the number of active projects, the number of concurrent agents, and the number of compliance scans. If limits are exceeded, you will be notified that AI use is unavailable until the next billing cycle or until upgraded to a paid subscription.
At the end of the trial, the credit card on file is automatically charged for the selected subscription tier. If no plan has been selected, the account is suspended. All data, projects, and agents are retained in a read only state for a limited grace period to allow reactivation without data loss.
Yes. All trial activity, including uploaded regulations, parsed micropolicies, created projects, and configured agents, is preserved when upgrading. Audit logs and compliance reports are also retained. Migration does not require re-ingestion or reconfiguration.
Trial users have access to documentation, FAQs, sample code, and community updates. Email support is available on a best effort basis. Paid subscriptions include SLA backed support, guaranteed response times under four hours, and access to dedicated support channels such as Slack or GitHub issues.
Billing can be monthly or annual. Annual subscriptions may include discounted pricing. All billing is handled automatically through the credit card on file. Enterprise contracts can support invoicing and purchase orders upon request.
Yes. You can upgrade from trial to paid at any time, or between paid tiers, without disruption. Downgrades are possible at the end of a billing cycle, subject to usage limits in the lower tier.
Yes. In addition to the standard free trial, enterprise organizations may qualify for extended pilot programs that include higher limits, dedicated support, and co-development opportunities. These require a signed agreement and may include proof of concept deliverables.
All uploaded regulations, micropolicies, projects, and compliance reports are treated with the same security and governance standards as in paid plans. Data is encrypted in transit and at rest, and access is governed by role based access control.
Data is retained for a grace period of 30 days after trial expiration. During this period, you can upgrade and restore full access. After the grace period, data may be archived or permanently deleted depending on compliance requirements.
Yes. A trial account can be configured with multiple users and roles. This allows teams to test both developer and compliance officer workflows within the same organization.
Paid subscriptions include enterprise grade features such as:
• Unlimited agents and projects
• Full webhook and integration support
• Custom tool creation and API connectors
• SLA backed uptime commitments
• RBAC customization and advanced role mapping
• Audit ready Agent Passports and full access logs
• Enterprise authentication such as SSO, SAML, Okta, and Azure AD
• Dedicated compliance and developer support channels
Yes. The system is designed for portability. All trial activity can be carried into SaaS or enterprise deployment models without reingestion of policies.
During the trial, usage metrics are tracked and available in the dashboard. These metrics help organizations understand typical API volume, agent load, and project scale. The i-GENTIC team can provide recommendations based on these metrics before the trial ends.
Yes. Enterprise accounts may negotiate custom pricing based on projected agent count, regulatory frameworks supported, or data processing volume.
The trial includes basic reporting and scorecards. Paid subscriptions expand this to include full audit logs, passports, and exportable compliance artifacts suitable for regulators.
Trial accounts support limited integrations. Paid accounts unlock advanced integrations with identity providers, cloud platforms, and third party compliance systems.