Version: v3.2 
Authentication
Learn how to set up and manage secure authentication for Trace, ensuring only authorized users can access observability and compliance data.
Overview
Trace uses Amorphic's secure authentication system to ensure only authorized users can access compliance and observability data. The system provides secure login, session management, and role-based access control to protect sensitive information.
Security Features
Trace provides enterprise-grade security with:
- Secure Authentication: Protected login with token-based authentication
- Encrypted Communications: All data transmission is encrypted and secure
- Session Management: Automatic session handling with secure timeouts
- Access Control: Role-based permissions to control what users can see and do
Authentication Flow
1. Getting Access to Trace
To start using Trace, users need:
- Amorphic Account: You must have an active Amorphic account
- Trace Access: A Trace administrator must grant you access through the Apps interface
- Login: Once granted access, you can log in through the Trace interface
- Secure Session: Login sessions are automatically secured and managed

2. Session Management
- Automatic Login: Authentication is handled seamlessly when accessing Trace
- Session Security: Sessions are automatically protected and encrypted
- Stay Logged In: Sessions persist securely across browser sessions
- Automatic Renewal: Authentication is automatically renewed as needed
User Access Management
Granting Access to Trace
Trace administrators can add new team members to access the application:
- Navigate to Apps from the Explore menu
- Select Trace from the application list
- Go to the Authorized Users tab
- Click + Provide Access
- Select the Amorphic user to import
- Click Import to grant access
Best Practice
Regularly review authorized users and remove access for users who no longer need Trace functionality.
Revoking Access
To remove a user's access to Trace:
- Open the Trace application from the Apps list
- Navigate to the Authorized Users tab
- Find the user in the list
- Click Remove Access in the Actions column
- Confirm by clicking Remove Access in the dialog