Edison Watch

Self-Serve Security

Zero-knowledge credential encryption, transport / OAuth, and data retention for Edison Watch.

These are the protections every Edison Watch tenant gets out of the box-no enterprise contract required.

Credential Encryption

Edison uses zero-knowledge encryption for stored credentials. No encryption keys are stored on the server.

Credential typeEncrypted withKey stored?
User credentialsUser's personal keyNever -- hash only
Admin credentialsDomain key (optional)Never -- hash only

The user's key is a composite of typed segments: user:{personal_key}.admin:{org_key}[.role:{name}:{key} ...], delivered to the server in the X-Edison-Secret-Key request header and never persisted. Each stored secret is encrypted with an AES-256-GCM key derived via HKDF-SHA256, using an info parameter of edison-secret:{context} where {context} uniquely identifies the secret (e.g. server:template_key). This context-based derivation gives each secret its own derived key without the server ever storing key material.

Transport & Auth

  • Auth: HMAC-signed API keys or SAML 2.0/OIDC.
  • Transport: TLS 1.2+ mandatory.
  • Isolation: Clients communicate only with the Edison server; no direct client access to MCP backends.

Data Retention

Data TypeLoggedRetention (Default)
Tool CallsMetadata & Params90 Days
ResultsTruncated Output90 Days
Security EventsFlag changes & Blocks1 Year
ApprovalsUser decisions1 Year

Privacy: Raw file contents and full conversation histories are not tracked or stored on Edison servers.

On this page