Skip to main content

Security

  • Authentication: Supports OAuth2, API keys, or other authentication methods to secure database connections and user access.
  • Authorization: Role-based access control (RBAC) can be implemented to restrict user access to certain data or dashboard features.
  • Data Encryption: Ensures that sensitive data is encrypted during both storage and transmission.