Explore which features are right for your team.
Choose the plans you want to compare using the drop-down functionality below, or view our full plan comparison here.
Which users count towards per-user pricing?
All users who can log in to your Stoplight workspace count toward the per-user pricing. Stoplight user types include Admins, Owners, Makers, Viewers, and Guests. Anonymous users accessing your documentation that is set to Public are not counted toward the per-user pricing. For more information visit Stoplight Documentation on Workspace Roles.
What is a project?
A Stoplight project represents a Git repository. Projects can contain multiple API descriptions, schemas, documentation, and even your source code.
Which Git providers are supported by Stoplight?
Stoplight currently integrates with GitHub, GitLab, Azure DevOps, and Bitbucket. Please check out our roadmap for upcoming integrations.
What happens when adding users mid-billing cycle?
We’ll make a one-time, prorated charge to your credit card to cover new user accounts for the remainder of the current billing period. At the end of each monthly billing cycle, you will be billed for the upcoming month’s subscription-based on the exact number of Stoplight users.
How secure is Stoplight Platform?
Our hosted platform is monitored around the clock by a dedicated team of engineers. Our servers run on Google Kubernetes Engine and are configured in accordance with their recommended best practices, and all of the data we store is encrypted. Both the hosted platform and our on-premise artifacts receive security patches at least once a month (but often more).
According to strict need-based policy, access to critical infrastructure and data is restricted to a handful of engineers. Our on-premise artifacts are designed to never transfer or store sensitive data in cleartext, support running as non-root or with random UID, and are compatible with Linux security systems like SELinux or AppArmor. We offer artifacts in several distributions and have experience working with enterprise security teams to meet their unique requirements.