/

How Hightouch uses Hasura to manage complex access-controls for reverse ETL flows

Hightouch implemented a complex hierarchical authorization system in Hasura with individual permission overrides & permission inheritance in under 2 weeks
videoWebinar
timeNOV 18, 2021
time9 AM PST
What you will learn
  • Join us for a live webinar to learn how Hightouch, one of the fastest growing startups in the reverse ETL & operations analytics space, implemented a complex hierarchical authorization system in Hasura with individual permission overrides and permission inheritance.
  • Hightouch maps hundreds of sensitive data sources from point A to point B, and authorization & access control is critical for their business.
  • Hasura has a granular role and permissions system to handle this that is capable of almost any scenario. Hightouch’s use case required a bit of engineering between the database and Hasura's permission system, which took them only 1.5 weeks with one developer working on it - this would otherwise have taken them at least 2-3 months!
  • Dive deeper into their story as we talk to their co-founder & CTO Josh Curl.
  • If you can't make it, sign up anyway and we'll send over the link to the recording.
  • Tick
    Understand their auth model
  • Tick
    Dive deeper into Hightouch’s architecture & use of the Hasura authorization engine
  • Tick
    Hightouch has been built with Hasura from day 1 and has scaled rapidly - learn how Hasura has impacted their business

VIEW RECORDINGVIEW RECORDING

Loading...
Presented by
Josh Curl
Josh Curl
Co-founder Hightouch