Skip to content
fullstackhero

Concept

Overview

Authentication, authorization, tenant isolation, impersonation, 2FA, rate limits, webhook signing, data protection, CORS — the security surface in one map.

views 0 Last updated

Security in fullstackhero is layered defence with sensible defaults. JWT bearer with rotating refresh tokens; fine-grained permission gates on every endpoint; ASP.NET Identity for the user store; multi-tenant isolation as the default behaviour of every query; rate limiting on auth-flow endpoints; HMAC-signed webhooks; Valkey-backed data protection keys; audit on every state change; JSON masking for sensitive payloads.

The pillars

Each page covers one concern in depth.