Handling emails.
Each user is given an email address, linked to their work email address. Aglide's Zero Trust model means very little is known about who owns each email, besides what address it is linked to.
When emails are sent to these addresses, Aglide determines if they could support SSO enforcement. If they can't, they are automatically forwarded to the linked email address. If they can, they're encrypted with zero trust, end-to-end, public key cryptography, and temporarily stored.
Aglide has never, and will never, bulk store and analyse your emails. It is impossible for Aglide, or anyone else for that matter, to read your stored emails.

Processing
Aglide email addresses are of the format [anonomousID]@aglidesso.com. When an email is sent to this address, the anonomous ID is used to recover the linked email address and public key. Email addresses are administratively encrypted at rest.
When emails are send to these addresses, they are checked against known emails that could support SSO enforcement. If there is a match, the email is encrypted, temporarily stored, and potentially forwarded to the user's workspace admin. If not, the email is forwarded to the linked email address, and not stored.

The purpose of Aglide email addresses.
Aglide Desktop is better able to perform certain functions (e.g., SSO, AutoMigration, etc.) when it has access to data from certain emails (e.g., confirmation links). As a result, relevant emails are stored so the Aglide Desktop app can access them when running these processes. As soon as an email is recovered by the app, it's deleted.
While your authenticated Aglide desktop app may need these emails, Aglide does not. That is why we are very selective about the emails we store, we store them in a way that ensures only the app signed in to by you can access them, and they are only stored temporarily.
It is impossible for Aglide, or anyone else for that matter, to read your stored emails.

Encryption and temporary storage
Each Aglide user has a public and private key pair. The private key is encrypted with the user's local key, meaning any data encrypted with the public key can only be decrypted by the user on their local machine (see section 2).
The main body of the email is encrypted with the user's public key using the RSA-OAEP standard. To allow for search, the subject, sender, and email category (e.g., password reset) are encrypted with the administrative key. The email is then temporarily stored in case it's needed for a local process, and deleted as soon as it is recovered by the desktop app.