Identity infrastructure is the kind of software that earns trust by being inspectable, not by being marketed. The specifications above describe what each product does, what it doesn't, and the operational envelope a deployment inherits. They're written so a security architect or platform engineer can evaluate the design without a sales call sitting in the middle.
If you're evaluating one of our products and you find a question the specification doesn't answer, that's worth telling us — the specification is the surface where we resolve those questions in writing rather than in conversation.