This section is a guide to best practices for security and data access with JackDB. There are a number of security features built into JackDB to manage and control access to your data:
Authentication
Users are authenticated for every request.
Authorization
Role-based access control and time-based permissions ensure that users are only authorized to access the data sources necessary for their roles.
Encryption in transit
All traffic between users and JackDB is encrypted with HTTPS.
Encryption at rest
Data are stored fully encrypted, both in our database and on our servers.
Audit log and activity feed
All activity and requests in JackDB are logged for auditing purposes.
Whenever possible, we recommend creating a read-only user on your database. In general, you should limit access privileges on your database to the minimum that users will require.
JackDB connects to your database in a specific, limited way. We access your data in real-time and only retrieve the database records necessary to support a given query. Results from queries are temporarily buffered and stored fully-encrypted.