This section describes recommended best practices for ensuring security.
Periodically, revoke existing keys and generate and distribute new keys. See Keys for more information about working with keys.
Use Admin keys sparingly. Keys associated with custom roles that confer specific privileges provided increased security. See User-defined role for more information about working with roles.
Limit the scope of operations used in ABAC role predicates wherever possible. ABAC roles are evaluated for every query, which can impact overall performance.
While ABAC roles can be used to filter out documents that should not be readable by the current client, such filtering can involve evaluating every document in a collection. Instead, use indexes for filtering.
Is this article helpful?
Tell Fauna how the article can be improved:
Thank you for your feedback!