User Mapping
- Map your existing user table and columns to what SWAIN’s authentication layer expects.
- Specify which table holds user accounts and identify key columns such as user ID, email and password hash.
- Optionally map fields for roles or permissions if you plan to use role-based access control.
- Accurate user mapping ensures that login, signup and token generation work correctly with your database schema.