Skip to main content

Security and Authentication

  • Authentication: OAuth2 / JWT-based authentication.
  • Role-Based Access Control (RBAC): Ensures only authorized users can execute queries.
  • Database Credentials Management: Securely stored in environment-specific configurations.
  • Query Injection Protection: Queries use parameterized execution to prevent SQL injection.