Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Maybe they mean authorisation rather than authentication but like you, I am curious if they will elaborate further on how is Postgres RLS used.


Probably similar in an overall sense to Postgraphile et al[0], in case you haven't seen that - although I am also interested in the specifics relating to Supabase.

[0] https://www.graphile.org/postgraphile/security/




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: