Secbez Docs

Configuration

What's configurable in a Secbez Enterprise deployment — at a glance. Wiring details are scoped per engagement.

This page is a high-level overview of what's configurable in an Enterprise deployment. The exact wiring — environment variables, image references, network policies, internal CA bundles, secrets management — is scoped with you when the deployment is stood up and delivered as part of the engagement.

Per-repository and per-organization settings

Settings that affect day-to-day usage live on the dashboard and behave the same way they do in SaaS:

  • Scan triggers — manual triggers and any optional automatic events configured per repository.
  • Path includes / excludes — restrict the scan to specific directories or skip generated paths.
  • Policy — severity / confidence thresholds for warn and fail outcomes; per-rule and per-path overrides.
  • Suppressions and baseline — server-side suppression rules, inline markers, baseline lifecycle.
  • Notifications and integrations — outgoing webhooks and standard notification channels.
  • Members and roles — owner, admin, member, read-only, with optional per-repository overrides.

Deployment-level settings

Deployment-level settings are the operator's surface — what gets configured once when the deployment is stood up and rarely changes after that:

  • License — tier, expiration, deployment binding, feature flags.
  • Database and storage — for metadata, findings, baselines, audit, and graph snapshots.
  • Queue — managed queue for scan-request dispatch.
  • Model routing — which step uses which model (managed provider, BYO key, BYO endpoint, BYO open-source model on your GPUs). See BYO Models.
  • Budgets — file, candidate, LLM-call, and time budgets per scan or per repository. Deep Scan removes them; see Deep Scan.
  • GitHub integration — App credentials and (for GitHub Enterprise Server) the GHES API base URL.
  • Networking — outbound allowlist, air-gapped mode, and any environment-specific constraints.
  • Observability — logs, metrics, and traces, integrated with your existing stack.

The exact set is shaped to your environment — bring constraints (regulated network, internal CA, mirrored registry, custom auth, in-house compliance framework) to the engagement and we scope them together.

License model

The license is a signed bundle delivered with the deployment. It carries the tier (pilot | starter | growth | enterprise), expiration, and deployment binding. License enforcement is intentionally minimal — it signals "this is a product" rather than acting as DRM. Unlicensed mode is available for development and staging.

Where the wiring lives

A connection guide tailored to your install target ships with the deployment bundle. Reach out to your account contact for the latest bundle.

On this page