Use-case documentation, organized by role.
This page is the practical map: where operators, contributors, and enterprise teams should start, and where to go next.
By persona
Develop and extend
Governance and adoption
Journey selector
Choose your role and follow the shortest path from first access to production-ready outcomes.
Apply edge route setup on your TLS ingress and validate runtime entrypoints.
Enforce identity boundaries, TLS, and operational access controls.
Run status and verification checks, then archive signed evidence.
Start with current features and setup to map working surfaces.
Implement product objectives and keep verifier contracts passing.
Publish only claims backed by status artifacts and CI provenance.
Define ownership, control planes, and release gate responsibilities.
Roll out by environment with explicit evidence checkpoints.
Expand capabilities while preserving reliability and policy posture.
