Security
Harper uses role-based, attribute-level security to ensure that users can only gain access to the data they're supposed to be able to access. Our granular permissions allow for unparalleled flexibility and control, and can actually lower the total cost of ownership compared to other database solutions, since you no longer have to replicate subsets of your data to isolate use cases.
Authentication
- JWT Authentication - Token-based authentication using JSON Web Tokens
- Basic Authentication - Username and password authentication
- mTLS Authentication - Mutual TLS certificate-based authentication
Certificate Management
- Certificate Management - Managing certificates and Certificate Authorities
- Certificate Verification - Certificate revocation checking (CRL/OCSP)
Access Control
- Configuration - Security configuration and settings
- Users and Roles - Role-based access control and permissions