Enterprise Revit Automation

Secure, compliant, and manageable AI-powered Revit automation designed for enterprise IT environments. Deploy with confidence using Azure AD integration, RS256 asymmetric token signing, runtime-validated SOC 2 controls, and comprehensive administrative oversight.

Azure AD Integration

Seamless SSO with multi-tenant support

Data Isolation

Strict database-level tenant separation

No AI Model Training

Your prompts and data are never used to train AI models

SOC 2-Aligned

Runtime-validated controls for audit logging, access control, and GDPR-compliant data handling

Asymmetric Token Security

RS256-signed JWTs with public key discovery — industry-standard, verifiable by any compliant client

User Management

Bulk provisioning and seat-based licensing

Enterprise-Grade Features

Comprehensive security, compliance, and management capabilities designed for IT administrators

🔐 Authentication & Security

Azure AD Single Sign-On

Seamless integration with company Active Directory and multi-tenant B2B support

Multi-Factor Authentication

Enterprise-grade security requirements

Role-Based Access Control

Company Admin, Admin, User and dual purpose roles with dynamic Azure AD group mapping

Domain-Based Authentication

Automatic company assignment via email domain with secure invitation tokens

👥 User & Company Management

Bulk User Management

Invite multiple users via email with custom messages and role pre-assignment

User Authorization

Automatic user authorization with revokable machine bindings

Seat-Based Licensing

Flexible user allocation per company with real-time utilization tracking

Usage Monitoring

Track user activity, last login times, and usage analytics

🛡️ Advanced Security Controls

Multi-Tenant Data Isolation

Your firm's data is strictly partitioned from other organizations at the database level — no cross-tenant data access is possible

Machine Binding

Revit sessions are cryptographically bound to licensed machines via one-time nonce-protected authentication handshakes — preventing credential sharing, replay attacks, and unauthorized access

Audit Logging

Comprehensive, tamper-evident audit logs for all significant operations — supporting compliance reviews and incident investigation

Asymmetric JWT Signing (RS256)

Session tokens are signed with a 2048-bit RSA private key and verified against a published public key. A compromised symmetric secret cannot forge tokens — the private key never leaves the backend server

Content Security Policy

Strict per-response Content Security Policy applied to all endpoints — including streaming responses — blocking inline script injection and unauthorized resource loading

Intelligent Rate Limiting

Per-endpoint throttling with stricter limits on authentication routes (10 req/min). Distributed counters shared across instances ensure consistent enforcement at scale

Data Leak Detection

Automated monitoring for suspicious export activities and compliance violations

Security Headers

HSTS, X-Frame-Options, X-Content-Type-Options, and Referrer Policy enforcement

Input Validation & Injection Prevention

All inputs are validated and sanitized server-side; all database queries are parameterized to prevent SQL injection

📋 Compliance & Infrastructure

SOC 2-Aligned Controls

Security architecture follows SOC 2 principles including access control, audit logging, and availability monitoring. Controls are validated at runtime on every deployment — not checked by assumption

GDPR-Compliant Data Handling

Data is scoped to your organization and handled in accordance with GDPR requirements. Data deletion and anonymization requests are fully honoured — including machine bindings, chat history, and all personally identifiable information

Hosted on Microsoft Azure

All infrastructure runs on Azure App Services and Azure SQL Database in the US — the same platform trusted by enterprise organizations worldwide

Encrypted Transit & Authentication

All traffic is encrypted over HTTPS with RS256-signed JWT token-based access. Tokens carry scoped claims, are bound to issuer and audience, and expire after 8 hours. The public signing key is discoverable at a standard JWKS endpoint for third-party verification

🤖 Data Privacy & AI

Business API Access — Not Consumer Products

NexusAI routes all AI requests through business-grade API endpoints. Your prompts never touch consumer chat products like ChatGPT or Claude.ai, which have different data handling policies

Your Data Is Not Used to Train AI Models

Unlike consumer AI tools, business API providers do not use your prompts or model data to train their AI models. Your proprietary project information stays yours

API Keys Never Reach End-User Machines

All AI provider credentials are stored securely on the NexusAI backend server. End users have no access to API keys or provider credentials

Multiple AI Model Options

Access Claude, GPT, Grok, and Gemini — all routed through the same secure backend with consistent data handling controls regardless of which model is used

Simple Enterprise Deployment

Get your team up and running with NexusAI in just a few steps

1

Account Creation

Azure AD single sign-on, company creation and seat purchasing takes minutes.

2

User Provisioning

Bulk email invites for users with automatic role assignment. Update role assignments anytime.

3

Revit Integration

Deploy the NexusAI add-in through your standard Revit deployment process. Users authenticate automatically.

4

Monitor & Manage

Use the admin dashboard to monitor usage, manage seats, and ensure compliance across your organization.

Get Started with NexusAI Enterprise

Sign in with Microsoft to create your company profile, purchase seats, and deploy NexusAI across your organization. Founders Program pricing — 50% off for 12 months — is available now.

🚀 Get Started — Sign in with Microsoft Download the Revit Add-in

Questions or need onboarding support?
[email protected]