Documentation Index
Fetch the complete documentation index at: https://docs.leedab.com/llms.txt
Use this file to discover all available pages before exploring further.
Your data lives on hardware you own, inside your building. No LeedAB cloud, no shared tenant, no route out of your network.
Encrypted at rest
All credentials, documents, and logs are encrypted with AES-256. Keys are stored in the appliance’s Secure Enclave — they never leave the chip.
Audit trail
Every AB action and every human action is written to a tamper-evident WORM log. Each entry is cryptographically chained to the previous one — any deletion or modification breaks the chain. Exportable to Splunk, Microsoft Sentinel, Elastic, and others.
Access control
Roles come from your SSO directory via SAML 2.0. SCIM keeps access in sync as your team changes. Each role maps to a specific set of ABs — no role bleeds into another by default.
See the access control guide for role configuration and approval scoping.
Air-gap mode
For ITAR, EAR, or classified workflows, LeedAB can run with all internet egress physically disabled. Models are pre-baked into the appliance before delivery. Updates arrive as signed images.
Air-gap mode is a deployment-time decision — outbound calls are blocked at the hardware level. Frontier model access is unavailable; all inference runs on-device.
See the air-gap guide for details.