You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Following are the points that the locker application needs to facilitate:
Multi-Tenancy
Logical Tenant Isolation
Multi-Tenancy
Multi-tenancy can be achieved by constructing different app state based on the request context. This will prevent major changes in the application logic while enabling multi-tenancy. This can be achieved by adding a middleware that will construct the app state based on the request context and forward it to the request handler.
Logical Tenant Isolation
Logical tenant isolation can be achieved by implementing schema based multi-tenancy. This will allow the application to have a single database but different schemas for different tenants. This will prevent data leakage between tenants and will also allow the application to scale horizontally. This can also enable use (in future) to split the database based on the tenant schema.
This can also be done in the same middleware, where we can fetch the appropriate connection pool based on the tenant schema and forward it to the request handler.
Feature Description
Internal Implementation Details
Following are the points that the locker application needs to facilitate:
Multi-Tenancy
Multi-tenancy can be achieved by constructing different app state based on the request context. This will prevent major changes in the application logic while enabling multi-tenancy. This can be achieved by adding a middleware that will construct the app state based on the request context and forward it to the request handler.
Logical Tenant Isolation
Logical tenant isolation can be achieved by implementing schema based multi-tenancy. This will allow the application to have a single database but different schemas for different tenants. This will prevent data leakage between tenants and will also allow the application to scale horizontally. This can also enable use (in future) to split the database based on the tenant schema.
This can also be done in the same middleware, where we can fetch the appropriate connection pool based on the tenant schema and forward it to the request handler.
Approach:
cards/fingerprint
apivault
to store the encrypted card details #92cards/add
apicards/retrieve
apicards/delete
apiThe text was updated successfully, but these errors were encountered: