Enforces absolute data boundaries between tenants in shared schema via RLS policies on tenant_id.
100
100%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
ALTER TABLE ... ENABLE ROW LEVEL SECURITY. HALT if RLS is not enabled on the target table.auth.jwt() -> 'app_metadata' ->> 'tenant_id'.anon role on tenant-scoped tables.USING (true) or WITH CHECK (true) on any tenant-scoped table.tenant_id column. HALT and report the missing column.SECURITY DEFINER functions that bypass RLS unless the function explicitly sets SET search_path and re-checks tenant_id.authenticated role exclusively.tenant_id column type (e.g., ::uuid).pg_policies after every CREATE POLICY statement.tenant_ prefix followed by the operation (e.g., tenant_select, tenant_insert).custom-access-token-hook is deployed before executing any phase.