Your data never leaves your network
Aegis is built for environments where data sovereignty, access control, and compliance are non-negotiable. No external API calls, no cloud dependencies, no compromises.
Deployment
100% On-Premises
Aegis runs entirely on your infrastructure. Every component — API, worker, vector store, LLM — is deployed within your network boundary.
- Docker Compose or Kubernetes deployment
- No outbound network calls required
- Air-gapped environment support
- Local LLM inference with vLLM or Ollama
- All data stored in your own databases
Access Control
ACL Enforced at Every Layer
Document-level access control is not a bolt-on — it's woven into the ingestion pipeline, vector store, and query engine.
- Permissions synced from source systems during ingestion
- ACL metadata stored alongside every vector embedding
- Query-time filtering before results reach the LLM
- Group-based and user-based permission models
- Deny-by-default: no ACL = no access
Authentication
Enterprise Identity Integration
Integrate with your existing identity provider. Aegis supports OIDC, SAML, LDAP, and trusted reverse proxy headers out of the box.
- OpenID Connect (Okta, Auth0, Azure AD, Keycloak)
- SAML 2.0 federation
- LDAP / Active Directory groups
- Trusted proxy header pass-through (X-Auth-User)
- Environment-aware: strict in prod, flexible in dev
Compliance
Compliance-Ready Architecture
Aegis provides the technical controls needed for SOC 2, HIPAA, GDPR, and other regulatory frameworks.
- Full audit log of every query and data access
- Data retention policies with automated purging
- Encryption at rest and in transit (TLS 1.3)
- Role-based access to admin APIs
- Exportable compliance reports
Data Flow
How Your Data Moves Through Aegis
Two isolated pathways: ingestion writes data in, queries read it out. Both enforce ACL at every step.
See Aegis in Action
Schedule a personalized demo and see how Aegis transforms your team's knowledge into a secure, searchable resource.
Request a Demo