Auth model
How authentication works, when it is required, and how tokens flow.
How authentication works, when it is required, and how tokens flow.
Core mental model: signals → scoring → outputs.
How deterministic scoring works and how confidence is computed.
Closed vocabulary of signals, structure, and extraction constraints.
End-to-end mental model: inputs → evidence → signals → scoring → reports.