Open app
Moonborn — For you

Synthetic user panels, RBAC, audit, compliance, ops Research & admin

Synthetic user panels, RBAC, audit, compliance, ops.

Suggested reading order
01
Quickstart

Generate your first persona in five minutes.

Open →
02
Synthetic user panel

Build a research panel of diverse personas, run a structured interview against the panel, and aggregate the results without your personas converging.

Open →
03
Workspace + RBAC setup

Stand up a Moonborn workspace, invite teammates, assign roles, and configure an SSO + SCIM provider for org-wide identity.

Open →
04
Synthetic user research

Run qualitative research panels at the speed of code. Five-persona panels, structured interviews, longitudinal consistency — without the recruiting overhead.

Open →
05
Enterprise RBAC + SSO

SAML 2.0 single sign-on, SCIM 2.0 provisioning, custom roles, IP allowlists, and data-residency lock — the org-level identity story for regulated buyers.

Open →
06
Audit + compliance

GDPR DSARs, account deletion, retention policies, data residency, hash-chained audit log. The compliance surface Moonborn ships out of the box.

Open →
07
Audit + provocation tests

The LLM-as-judge audit scores generated personas across five dimensions; the provocation test suite probes for role-breaking, contradictions, and prompt-injection failure modes.

Open →
08
Moderation pipeline

Three-stage moderation — input intent screen, output content screen, impersonation + PII checks. Multi-classifier vote with org-tunable thresholds.

Open →
09
RBAC role matrix

The seven built-in roles, their permissions, and how to assign or change them. Custom roles on Enterprise.

Open →
10
SSO / SAML setup

Wire SAML 2.0 between Moonborn and Okta / Azure AD / Google Workspace. Metadata URL, ACS endpoint, IdP-initiated and SP-initiated flows.

Open →
11
SCIM provisioning

Push user lifecycle changes from your IdP into Moonborn — RFC 7644 endpoints, attribute mapping, group-to-role binding.

Open →
12
Audit log export

Export the hash-chained audit log as a signed archive. Verify the chain offline; archive in your own retention system.

Open →
13
API key scopes

The 13 canonical scopes that constrain bearer tokens. Issue least-privilege keys per service.

Open →