NoCodeBackend

Product details
Henry_CHenry_C
Henry_CPLUS
Feb 21, 2026

Q: Authentication & Role-Based Security Verification (Current + Future Capabilities)

1. Is role-based access supported (admin/user/custom roles)?

2. Can we apply role rules per route or per table?

3. How are passwords stored (strong hashing)?

4. What is the session duration? Is auto logout supported?

5. Is a refresh token used or only session cookies?

6. Are HTTP-only cookies used?

7. Is there secure email verification and password reset flow?

8. Is rate limiting / brute-force protection implemented?

9. Can sessions be revoked / force logout supported?

10. Can advanced roles or SSO be added in the future?

Founder Team
Riya_NoCodeBackend

Riya_NoCodeBackend

Feb 21, 2026

A: Hey — great security checklist. Below is a clear overview of our current capabilities and what’s planned.

1️⃣ Role-based access

We support Row Level Security (RLS) with three access modes:

• Private — only the data owner can access
• Shared — all authenticated users can access
• Public — no authentication required

Named roles like “admin” or custom roles are not built-in today but are planned for future expansion (see #10).

2️⃣ Rules per route or per table

Access policies are configured per table, and both authenticated and public API routes automatically enforce the table-level policy you’ve defined.

3️⃣ Password storage

Passwords are never stored in plaintext. We use industry-standard bcrypt hashing for secure password storage.

4️⃣ Session duration / auto logout

Sessions have a 7-day duration and automatically expire after that period, effectively acting as auto logout. Active sessions are refreshed during use to keep users signed in while they remain active.

5️⃣ Refresh tokens vs cookies

We currently use session cookies only. Sessions are extended on activity so users remain logged in while actively using the app.

6️⃣ HTTP-only cookies

Yes — session cookies are HTTP-only and use the Secure flag on HTTPS, preventing client-side JavaScript access and helping protect against XSS.

7️⃣ Email verification & password reset

Yes — we support secure password reset via email link and email OTP verification (6-digit code with 5-minute expiry). SMTP configuration is required per database.

8️⃣ Rate limiting / brute-force protection

Rate limiting is not built-in today but is on our near-term roadmap.

In the meantime, if you’re deploying behind services like Vercel, Cloudflare, or AWS, these platforms provide built-in rate limiting and DDoS protection that typically cover auth endpoints out of the box without additional setup.

Once we ship native rate limiting, it will work automatically without requiring deployment changes.

9️⃣ Session revocation / force logout

Yes — users can sign out to clear their session. Password changes can optionally revoke other active sessions, and deleting a user invalidates sessions.

🔟 Advanced roles / SSO (future)

The architecture is designed to be extensible. Google OAuth is already supported, and support for custom roles, SAML/SSO, and more advanced access models can be added as the platform evolves.

Share
Helpful?
1
Log in to join the conversation
Related questions
View product details