Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Exactly! That is a high level of what is happening in the background, but in the foreground, all you have to do is reference the tenant's ID. We also manage key rotations and other nitty gritties to secure your databases.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: