Skip to content
All features

Feature

Multi-tenant by design

Your data never leaks. Ever.

The bottom line

Isolation enforced at the database, audited continuously — the kind of answer your enterprise customers actually want.

Included

Part of the Platform plan — no upgrade tier, no add-on cost.

$179/mo

Security at the database level, not the app level.

MISE AN PLACE is a single-database multi-tenant platform. Tenants share infrastructure but their data is isolated by Postgres Row-Level Security policies. There's no application-level if-statement that could be bypassed by a bug. Postgres itself enforces tenancy.

How to think about it

Before, and after.

Most operators come to MISE AN PLACE because the workarounds stopped scaling. Here's what changes the day this feature is live.

Without it

  • Multi-tenant 'isolation' often means an app-level if-statement that one bug can break.
  • You can't audit who saw what, so you have to trust the platform unconditionally.
  • When a regulator or B2B customer asks about isolation, you have to email support.
  • You're betting your customers' data on a vendor's quarterly security review.

With MISE AN PLACE

  • Postgres itself enforces tenancy on every query — no app code can bypass it.
  • Every privileged action is in an append-only audit log you can export.
  • Architecture-level answer to 'how is my data isolated?' in your sales conversations.
  • Continuous RLS test suite runs in CI on every change to the schema.

What's included

Every detail you need.

Built by people who've worked in scheduled-production food and spent too many evenings with spreadsheets. Each item below is there because we needed it ourselves.

  • 01

    Row-Level Security on every table

    Every table has tenant_id and a policy: WHERE tenant_id = auth.tenant_id(). Postgres enforces it.

  • 02

    JWT-bound tenant resolution

    Tenant comes from the user's auth context, not the request. Forging a tenant_id is impossible from the client.

  • 03

    Append-only audit log

    Trigger prevents updates to audit rows. Reviewers can trust what they see.

  • 04

    Encrypted at rest

    Supabase manages disk encryption. Backups encrypted. Point-in-time recovery available.

  • 05

    RLS test suite

    Automated tests confirm tenant A cannot read or write tenant B's data, on every PR.

In the wild

How operators would use it.

Illustrative scenarios — not customer testimonials. These are the typical situations the feature was designed for.

All

Case 01

Scenario

Imagine a future bug where a server action queries the wrong tenant by mistake.

Outcome with MISE AN PLACE

Postgres rejects the query because the RLS policy doesn't match. The bug is caught at the database boundary, not customer trust.

What you'll see

In your dashboard.

RLS policy example

create policy orders_select on orders for select using (tenant_id = auth.tenant_id());

Try multi-tenant by design for yourself.

14-day trial. No card. Live in under 30 minutes.

Multi-tenant by design · MISE AN PLACE