FeatureSignals

Enterprise Overview

FeatureSignals Enterprise is built for teams that need advanced security, compliance, and administrative controls. SSO, SCIM, custom IAM, IP allowlisting, audit log export, and financially-backed SLAs — everything you need to run feature flags at scale in a regulated environment.

SSO / SAML

Single sign-on via SAML 2.0. Integrate with Okta, Azure AD, Google Workspace, OneLogin, and any SAML-compatible identity provider. Enforce MFA at the IdP level.

SCIM Provisioning

Automate user lifecycle management with SCIM 2.0. Provision and deprovision users, sync group memberships, and manage roles — all from your identity provider.

Custom Roles

Create fine-grained IAM roles beyond the built-in Admin, Editor, and Viewer. Define permissions per resource type, per environment, per project — the way your team works.

IP Allowlisting

Restrict access to the FeatureSignals dashboard and API by IP range. Enforce network-level security so only traffic from your corporate VPN or office CIDRs reaches your flags.

Audit Log Export

Export complete audit logs to your SIEM, data warehouse, or compliance archive. Stream events in real-time via webhooks or batch-export as CSV/JSON.

Priority Support

Dedicated Slack channel, 1-hour response SLA for P1 incidents, and a named solutions engineer who knows your setup. We answer before you finish your coffee.

SLA Guarantees

99.95% uptime SLA for FeatureSignals Cloud. 99.99% for Dedicated Cloud deployments. Financially backed with service credits — we put our money where our uptime is.

Deployment Options

PlanDeploymentSLABest For
Enterprise CloudMulti-tenant SaaS99.95%Most enterprises. Fastest time to value.
Enterprise DedicatedSingle-tenant, your cloud99.99%Compliance-heavy, data residency, isolated infra.
Enterprise Self-HostedYour infrastructureYour SLARegulated, air-gapped, or fully self-managed.

Getting Started with Enterprise

  1. Contact sales— Reach out to discuss your team's needs, compliance requirements, and deployment model.
  2. Security review— We'll share our SOC 2 report, penetration test results, and architecture documentation.
  3. Proof of concept — Spin up a dedicated instance in your cloud and validate against your requirements.
  4. Onboarding — SSO setup, SCIM configuration, team provisioning, and a guided walkthrough of enterprise features.

Learn More