619 B
619 B
Security Model
Principles
- Tokens are internal-only and never exposed to untrusted clients directly.
- Permissions are centrally managed in the gateway.
- Providers only validate identity; they do not set sessions or permissions.
JWTs
- Access tokens are short-lived and contain minimal claims.
- Refresh tokens are stored hashed and revocable.
Multi-tenant isolation
- User membership is scoped by tenant.
- Roles and permissions are evaluated per tenant.
Operational safeguards
- Rotate JWT secrets regularly.
- Use TLS in production.
- Enable HTTP-only cookies for refresh tokens when needed.