![How Hightouch uses Hasura to manage complex access-controls for reverse ETL flows](https://res.cloudinary.com/dh8fp23nd/image/upload/v1696596593/website%20v3/events/Events_0000_Layer-2_2_ezazpw.png)
How Hightouch uses Hasura to manage complex access-controls for reverse ETL flows
Hightouch implemented a complex hierarchical authorization system in Hasura with individual permission overrides & permission inheritance in under 2 weeks
![Josh Curl](https://res.cloudinary.com/hasura-cms-uploads/image/upload/v1698237008/josh_curl_400aa9102c1773e7b417e5b43e91a19e_c06d264f67.png)
What you will learn
Join us for a live webinar to learn how Hightouch, one of the fastest growing startups in the reverse ETL & operations analytics space, implemented a complex hierarchical authorization system in Hasura with individual permission overrides and permission inheritance.
Hightouch maps hundreds of sensitive data sources from point A to point B, and authorization & access control is critical for their business.
Hasura has a granular role and permissions system to handle this that is capable of almost any scenario. Hightouch’s use case required a bit of engineering between the database and Hasura's permission system, which took them only 1.5 weeks with one developer working on it - this would otherwise have taken them at least 2-3 months!
Dive deeper into their story as we talk to their co-founder & CTO Josh Curl. If you can't make it, sign up anyway and we'll send over the link to the recording.
- Understand their auth model
- Dive deeper into Hightouch’s architecture & use of the Hasura authorization engine
- Hightouch has been built with Hasura from day 1 and has scaled rapidly - learn how Hasura has impacted their business
Register
Loading...
What you will learn
Join us for a live webinar to learn how Hightouch, one of the fastest growing startups in the reverse ETL & operations analytics space, implemented a complex hierarchical authorization system in Hasura with individual permission overrides and permission inheritance.
Hightouch maps hundreds of sensitive data sources from point A to point B, and authorization & access control is critical for their business.
Hasura has a granular role and permissions system to handle this that is capable of almost any scenario. Hightouch’s use case required a bit of engineering between the database and Hasura's permission system, which took them only 1.5 weeks with one developer working on it - this would otherwise have taken them at least 2-3 months!
Dive deeper into their story as we talk to their co-founder & CTO Josh Curl. If you can't make it, sign up anyway and we'll send over the link to the recording.
- Understand their auth model
- Dive deeper into Hightouch’s architecture & use of the Hasura authorization engine
- Hightouch has been built with Hasura from day 1 and has scaled rapidly - learn how Hasura has impacted their business