Protect client credentials
Store client secrets and service tokens in your own secret manager and rotate them deliberately.
Public security guidance for external integrators. This page focuses on disclosure, secure secret handling, JWT verification, and the public boundary for reviewed access.
Store client secrets and service tokens in your own secret manager and rotate them deliberately.
Validate Knogin-issued tokens against the public JWKS endpoints instead of relying on private signing assumptions.
Do not infer unpublished routes, schema details, or partner-only workflows from the public documentation surface.
If you believe you found a vulnerability affecting the public site or documented integration surface, please report it privately.
Use this mailbox for vulnerability disclosure and security-reporting matters only.
security@knogin.comIf you need integration access or a buyer review, use the integration guide or contact form instead.