VigorLabs Developer
  1. VigorLabs Developer Platform
  2. Security & Compliance
Security

Ship integrations that can survive real review.

Last updated on: 2026-04-01 Guide

Use this guide to align token scope, webhook trust, playback governance, and retention-aware access rules with a defensible security model.

Baseline controls to adopt

  1. Use least-privilege scopes for every client credential.
  2. Separate machine-to-machine tokens from user-bound playback sessions.
  3. Log administrative access to device inventories, clip retrieval, and retention changes.
  4. Rotate secrets and signing keys on a defined cadence.

Recommended credential split

CredentialUse
Server tokenCloud API calls from backend services
Embed session tokenShort-lived browser playback sessions
Webhook signing secretInbound event verification

Design around data lifecycle

Retention policy shapes what a user can see, what an operator can replay, and what a downstream service is allowed to persist.

If your system exports camera metadata into an external warehouse, document how long mirrored data or clip references remain there.

Cross references

  1. Webhooks for signature verification and retry handling.
  2. UI Embed for playback session boundaries.
  3. Cloud API for scoped backend access patterns.