Skip to content

Security Controls

Kindo maintains security, auditing, and compliance controls to ensure users and agents operate within organizational requirements. Access these controls via Settings (gear icon) > Security.

Model Access and DLP Controls

The Model Access and DLP Controls panel showing providers, models, enabled status, and DLP filter toggles

This section manages which AI models are enabled for your organization.

  • Active — Users can access the model; agent and API requests succeed.
  • Disabled — The model is hidden from users; agent and API requests to it will fail.

You can also enable or disable DLP filters for specific models and manage model versions from this screen.

Default Settings

Default settings for new provider and new model behavior

Configure default behavior when new models are added:

  • New Provider — Whether adding new model providers is permitted in your organization.
  • New Models of Enabled Providers — Whether new models from an already-enabled provider are activated by default.

Data Loss Prevention (DLP) Filters

The DLP Filters panel showing built-in filter types

DLP filters are redaction mechanisms that tokenize sensitive data in outbound requests to AI models. When enabled, sensitive information is automatically masked in chat, agent, and API calls before reaching the model.

Kindo includes several built-in DLP filter types. You can also define custom filter patterns using:

Creating a custom DLP filter with string literal, phrase, or regex options

  • String literals — Exact text matches
  • Phrases — Multi-word patterns
  • Regular expressions — Pattern-based matching

Integration Access

The Integration Access panel with Active/Off toggles for each integration

Control which integrations are available to users:

  • Active — Users can use the integration to connect with external systems.
  • Off — The integration is unavailable to users in the organization.

Audit Log

Kindo records audit events whenever users, AI agents, or administrators perform actions within the platform. These events are retained in a log to provide a record of activity for security review, compliance, and incident investigation. Audit logging is available to organizations on the Enterprise plan.

What the Audit Log Captures

Every audit event includes a timestamp, the acting user, the organization, and structured metadata. Events fall into three categories:

  • User actions — Chat messages, file uploads, workflow management, API key and secret management, copilot activity
  • AI agent actions — Tool executions (success/failure), LLM requests, sandboxed code execution, DLP filter events
  • Administrative changes — Member and invite management, user group changes, security configuration updates, model management, organization settings
Full event type reference

User actions: Creating chats, sending messages, sharing conversations, uploading/removing files, creating/updating/deleting workflows, managing API keys and secrets, copilot usage, viewing and exporting audit logs.

AI agent actions: Successful and failed tool calls, LLM inference requests, sandboxed code runs, DLP filter redactions, automated API step generation in workflows.

Administrative changes: Adding/removing/changing roles for members, managing invitations, creating/updating/deleting user groups, updating security settings, configuring tool servers, managing sharing permissions, creating/deleting DLP patterns, adding/removing models, changing organization settings.

Viewing Events

The Audit Log panel showing recent user activity

Navigate to Settings > Security > Audit Log to view events.

Audit log with filters applied for user and activity type

Filter by:

  • User — Events from a specific user
  • Activity type — Filter by event category or specific event type
  • Date range — Narrow results to a specific time window

Event Details

Click any event row to view its full details:

An audit log event detail showing the event summary

  • Summary — Human-readable description of the action
  • Raw Data — Full JSON payload including files accessed, metadata, and contextual information

Exporting Events

Click Download CSV to export filtered events. Kindo generates the CSV asynchronously and emails a download link to you. The link expires after a set period.

Storage

Audit events are written to Kindo’s application database by default — no additional configuration required. Events are queryable in the admin UI and exportable as CSV.

Troubleshooting

Events not appearing — Confirm the organization is on the Enterprise plan and that the AUDIT_LOG_DISABLED feature flag is not enabled in Unleash.

CSV export email not received — Verify SMTP is configured correctly on the Kindo API service and that the requesting user’s email address is correct.

Sharing Permissions

The Sharing Permissions panel with external sharing toggle and minimum role setting

Control whether users can share agents or chats with individuals outside the organization:

  • When External Sharing is Active, configure the minimum user role required for sharing.
  • When External Sharing is disabled, users cannot share links to chats or agents with anyone outside their configured identity provider.