Fine-grained access control, data masking, row-level security, and comprehensive audit logging for compliance-ready data platforms.
Multiple authentication methods for every deployment scenario
Industry-standard JSON Web Tokens with configurable expiration, refresh token support, and secure token storage.
Long-lived API keys for service accounts and automation. Support for key rotation and scoped permissions.
Connect to enterprise identity providers including Azure AD, Okta, Auth0, and any OpenID Connect compliant IdP.
Argon2 password hashing with configurable work factors. Password policies and secure reset flows.
Sensitive credentials stored in OS Keychain or cloud key vaults, never in config files, never in plaintext
Developer -> GUI -> Control Plane API -> Credential Vault (Keychain / Key Vault)
|
Compute Node (on-demand)
Fine-grained permissions at every level of your data
Protect sensitive data at the column and row level
Dynamic data masking with multiple masking types: full mask, partial mask, hash, null replacement, and custom functions.
Filter rows based on user attributes. Users only see data they're authorized to access, enforced at query time.
Security policies cascade from parent objects. Schema policies apply to all tables; workspace policies apply to all schemas.
Policies evaluated at query time using current user context. Support for user attributes, group membership, and custom claims.
Built-in masking functions for common data types
FULL
Replace entire value with mask characters (****)
PARTIAL
Show first/last N characters, mask middle
EMAIL
Mask email local part, preserve domain
PHONE
Show area code, mask remaining digits
CREDIT_CARD
Show last 4 digits only
SSN
Mask social security numbers
HASH
One-way hash for consistent pseudonymization
NULL
Replace value with NULL
DATE_YEAR
Reduce date precision to year only
RANDOM
Replace with random value of same type
Comprehensive logging for security and compliance requirements
Data protection at rest and in transit
AES-256 encryption for all stored data. Support for customer-managed keys (CMK) across all cloud providers.
TLS 1.3 for all network communications. Certificate pinning support for high-security environments.
Integrated with cloud KMS services. Support for key rotation, versioning, and hierarchical key structures.
Encrypt sensitive columns with separate keys. Searchable encryption for specific use cases.
Enterprise security features built-in from day one.