Skip to main content

Portia Cloud Security

Understanding the security of your agentic system is critical to deploying agents in production. Portia uses production-grade security and encryption and offers granular customization of security policies to ensure your data is secure within our systems.

OAuth token handling

All OAuth tokens provided to Portia from third parties are securely encrypted within the application using a unique Google KMS key per organization. No internal staff member can view decrypted token data. Once a token is expired or consumed (depending on the retention policy - see below) it is deleted from all Portia systems.

OAuth token retention

Additionally, you can control how long Portia retains these OAuth tokens for. Within the org settings tab in the dashboard you can update your organization retention policy to one of the below options.

Token Retention Policies

Default

Under the default policy, Portia will store the encrypted token until it expires. We will also store any refresh tokens provided by the third party if they support this.

This retention policy is best for usability as it minimizes the number of times users will need to go through the OAuth authentication flow.

Use Once

Under the Use Once policy, Portia will only retain OAuth access tokens for one use. Once the token has been used it will be deleted. No refresh tokens are stored under this policy either.

This policy is best for security as it minimizes the amount of time tokens are stored but comes at the cost of ease of use. Users will be prompted far more often for authentication (including multiple times in the same workflow if a tool is used multiple times).

No Refresh

Under the No Refresh policy, Portia will store the encrypted tokens until they expire. However no refresh tokens will be stored.

This policy offers a blend of security and usability, with tokens being stored for a far shorter length of time (usually 24hours though it depends on the third party).