Enterprise Overview
FeatureSignals Enterprise is built for teams that need advanced security, compliance, and administrative controls. SSO, SCIM, custom IAM, IP allowlisting, audit log export, and financially-backed SLAs — everything you need to run feature flags at scale in a regulated environment.
SSO / SAML
Single sign-on via SAML 2.0. Integrate with Okta, Azure AD, Google Workspace, OneLogin, and any SAML-compatible identity provider. Enforce MFA at the IdP level.
SCIM Provisioning
Automate user lifecycle management with SCIM 2.0. Provision and deprovision users, sync group memberships, and manage roles — all from your identity provider.
Custom Roles
Create fine-grained IAM roles beyond the built-in Admin, Editor, and Viewer. Define permissions per resource type, per environment, per project — the way your team works.
IP Allowlisting
Restrict access to the FeatureSignals dashboard and API by IP range. Enforce network-level security so only traffic from your corporate VPN or office CIDRs reaches your flags.
Audit Log Export
Export complete audit logs to your SIEM, data warehouse, or compliance archive. Stream events in real-time via webhooks or batch-export as CSV/JSON.
Priority Support
Dedicated Slack channel, 1-hour response SLA for P1 incidents, and a named solutions engineer who knows your setup. We answer before you finish your coffee.
SLA Guarantees
99.95% uptime SLA for FeatureSignals Cloud. 99.99% for Dedicated Cloud deployments. Financially backed with service credits — we put our money where our uptime is.
Deployment Options
| Plan | Deployment | SLA | Best For |
|---|---|---|---|
| Enterprise Cloud | Multi-tenant SaaS | 99.95% | Most enterprises. Fastest time to value. |
| Enterprise Dedicated | Single-tenant, your cloud | 99.99% | Compliance-heavy, data residency, isolated infra. |
| Enterprise Self-Hosted | Your infrastructure | Your SLA | Regulated, air-gapped, or fully self-managed. |
Getting Started with Enterprise
- Contact sales— Reach out to discuss your team's needs, compliance requirements, and deployment model.
- Security review— We'll share our SOC 2 report, penetration test results, and architecture documentation.
- Proof of concept — Spin up a dedicated instance in your cloud and validate against your requirements.
- Onboarding — SSO setup, SCIM configuration, team provisioning, and a guided walkthrough of enterprise features.