Security at every layer of operation
Granular access control, two-factor authentication, activity logs, and state-of-the-art encryption. Complete protection for your financial operation, from dashboard to API.

Protection on two fronts
Kobana security operates in two complementary layers: in the dashboard, where your team accesses and operates the platform; and in the API, where your systems connect to automate processes.
Protected billing documents
Add extra layers of security to your boletos
Add a custom watermark to the background of boletos. This feature helps prevent fraud and forgery, making documents harder to tamper with.
Protect access to hosted boletos. The customer needs to provide a password based on their own data (CPF, date of birth) to view or download the document.
Dashboard access control
Who can do what in your account
Over 340 available permissions
Each user accesses only what they need for their role
- Create, edit, and cancel boletos
- Manage PIX and payment books
- Export and import data
- View accounts and balances
- Access statements
- Request withdrawals
- Create and approve transfers
- Schedule payments
- Process batches
- Manage users
- Configure account
- Administer sub-accounts
Integrations protected by design
Control who can access your API and validate webhook authenticity
Limit API access to authorized servers only. Requests from unregistered IPs are rejected, even with valid credentials.
Secure credentials for authentication. Write-permission tokens have mandatory expiry for renewal. Disable or revoke tokens via dashboard or API at any time.
All webhooks include HMAC-SHA256 signature in the X-Kobana-Signature header. Validate that the request actually came from Kobana before processing.
Each webhook has its own secret key, separate by environment. Store in environment variables and never expose in source code.
Dashboard vs API security
| Feature | Dashboard | API |
|---|---|---|
| Two-factor authentication | Yes | - |
| Password policies | Yes | - |
| IP restriction | Yes | Yes |
| Activity log | Yes | Yes |
| Granular permissions | Yes | Yes (per token) |
| Password protection on documents | Yes | Yes (via parameter) |
| Watermark on documents | Yes | Yes (via template) |
| Access tokens | - | Yes |
| Webhook signature | - | Yes |
Integrated with major banks
Frequently asked questions
Secure financial operation starts here
Configure ideal protections for your operation: strong authentication, access control, and complete traceability.