3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
16.6 2FA Enforcement
Orbnetes deployment and release orchestration documentation for operators and platform teams.
2FA (TOTP 6-digit) can be required per user policy/profile.
Typical behavior:
- if 2FA is required and not configured, user is prompted to set up before full access,
- after login (local or OAuth), 2FA challenge is required when enabled,
- setup usually includes QR code + verification code confirmation.
Why enforce 2FA:
- reduces risk from password reuse/phishing/account takeover,
- especially important for users with deploy/approval/global admin permissions.
Recommended policy:
- mandatory 2FA for:
- global admins,
- release approvers,
- users with production deploy permissions.
- optional but encouraged for low-risk read-only users.
Operational best practices:
- define backup/recovery process for lost authenticator access,
- audit 2FA adoption for privileged users,
- avoid granting high-risk permissions to non-2FA accounts.
Access Governance Checklist
Before enabling production use:
- Project membership and permissions are intentionally assigned.
- Global privileges are limited to minimal admin set.
- OAuth onboarding requires admin approval.
- API keys are scoped, documented, and rotated.
- 2FA is enforced for privileged roles.
- Audit logs capture sensitive access and permission changes.
This keeps authorization predictable, secure, and operationally manageable.