Plan Overview
AuditAuth operates at the application level.
Each application has an associated plan and a lifecycle state.
The combination of plan and state determines:
- Available features
- Capacity limits
- Retention policies
- Enforcement behavior
Billing is not only a commercial concern.
It directly affects how identity infrastructure behaves.
Application as an Operational Unit
In AuditAuth, an Application is an isolated identity boundary.
Each application has:
- Its own configuration
- Its own user base
- Its own observability scope
- Its own audit trail
- Its own subscription state
Application state is independent from user authentication state.
A user may be authenticated, while the application itself may be restricted.
Plan-Driven Capabilities
Every application is assigned a plan.
The plan defines:
- Authentication provider availability
- Maximum number of users
- Feature access flags
- Audit log retention
- Metrics retention and sampling
- Whitelabel behavior
Plans define permission boundaries.
They are enforced deterministically by the system.
State-Driven Enforcement
Applications also have a lifecycle state.
Examples of lifecycle states include:
activepast_duesuspendedcancelled
Lifecycle state affects enforcement independently from plan permissions.
For example:
An application in past_due status enters a grace period of one month.
During this period:
- Core identity functionality remains operational.
- Enforcement continues normally.
- Administrators are expected to resolve billing status.
If the grace period expires without resolution, the application may transition to a restricted state.
Grace Period Model
When an application becomes past_due:
- A one-month grace period begins.
- Authentication continues to function.
- Session enforcement remains active.
- No immediate disruption occurs.
After the grace period:
- Enforcement behavior may change.
- Feature access may be restricted.
- Administrative access may be limited.
Grace periods are designed to avoid abrupt identity disruption.
Separation of Concerns
Billing state does not invalidate issued tokens immediately.
Identity state and subscription state are separate concerns.
However:
Application lifecycle state may restrict:
- New authentications
- Access to dashboards
- Feature-level capabilities
- API usage beyond defined limits
Enforcement remains deterministic and application-scoped.
Deterministic Infrastructure Behavior
AuditAuth guarantees that:
- Plan permissions are enforced consistently.
- Lifecycle state transitions are explicit.
- Grace periods are time-bound.
- Feature access reflects subscription state.
There is no implicit fallback behavior.
Application state always governs capability boundaries.
Next Step
To understand how plans define capabilities, continue with:
- Application Model
- Plan Model