Integration reviews
API, auth, and connector scope
The docs should show what is public, what is tenant-scoped, and which service owns the authentication boundary.
Technical, deployment, security, and AI-access guidance for teams evaluating or operating the platform in public-safety environments.
Documentation posture
Keep deployment, procurement, and integration evidence in one operator-facing pack.
Core doc lanes
5 tracks
API endpoints covered
200+
Machine-readable access
CLI + JSON
Governance framing
CJIS-ready
Documentation pack
The strongest documentation is not a marketing appendix. It should tell a procurement team how the platform deploys, tell an integrator how data moves, and tell an operator where the controls sit.
Integration reviews
The docs should show what is public, what is tenant-scoped, and which service owns the authentication boundary.
Deployment reviews
Infrastructure notes need to make tenancy, storage, and network assumptions clear before a security questionnaire starts.
Operator reviews
Screens, exports, and audit behavior should show up beside the guidance so teams are not guessing at workflow fit.
Documentation record
Investigation surfaces, source material, and reviewer context should stay aligned with the written guidance.
Quick Start
Bootstrap a connector or operator sandbox quickly, then move into the deeper reference material as requirements sharpen.
npm install -g @argus/cli
argus init task-force-connector
argus auth login
argus devStart with the lane that answers the immediate question, then move deeper into the supporting technical or oversight material.
Operational context
The documentation should mirror the actual objects, statuses, and case context operators see in the platform.
Map the authentication boundary, service ownership, and endpoint coverage before integration work starts.
Review connector methods, payload expectations, and partner responsibilities for inbound and outbound data flows.
Compare cloud, hybrid, and on-prem deployment lanes with the infrastructure assumptions attached to each.
Inspect control posture, disclosure handling, and review-oriented security evidence.
Use machine-readable manifests and topic endpoints that mirror the actual investigation data model.
The integration and solution teams can walk through the exact deployment, security, or API materials your review requires.