What You Get
User Signup
Self-service registration with email verification
Secure Login
Password authentication with brute-force protection
Password Reset
Secure password recovery via email
JWT Tokens
Access and refresh tokens with configurable expiry
Roles & Permissions
Define roles in your prompt, and Backdrift enforces them at the API level:| Role | Permissions |
|---|---|
| admin | Full CRUD on all entities |
| member | Create/Read/Update tasks, Read projects |
| viewer | Read-only access |
Authorization Levels
Every endpoint has an authorization level:| Level | Description |
|---|---|
public | No authentication required |
authenticated | Any logged-in user |
admin | Users with admin role |
owner | Only the resource owner |
Example
Multi-Tenancy
For SaaS applications, Backdrift automatically isolates data by tenant:- Organization Entity - Tenant boundary
- Auto-Filtering - All queries filtered by org_id
- JWT Claims - Tenant ID embedded in tokens
How It Works
- User signs up and creates an organization
- User’s JWT includes
org_idclaim - Every API request is filtered by
org_id - User in Org A cannot access data from Org B
Password Policies
Backdrift enforces secure password policies:- Minimum 8 characters
- Requires uppercase letter
- Requires lowercase letter
- Requires number
- Requires special character (optional)
Token Configuration
| Token Type | Default Expiry | Configurable |
|---|---|---|
| Access Token | 1 hour | Yes |
| Refresh Token | 30 days | Yes |
| ID Token | 1 hour | Yes |
Using Authentication
Sign Up
Login
Make Authenticated Requests
Coming Soon
- Social login (Google, GitHub, Apple)
- SAML/OIDC federation
- Multi-factor authentication (MFA)
- API keys for machine-to-machine auth
Data Modeling
Learn how to define entities and relationships.
