Skip to main content

User Mapping

  • Map your existing user table and columns to what SWAIN’s authentication layer expects.
  • Specify which table holds user accounts and identify key columns such as user ID, email and password hash.
  • Optionally map fields for roles or permissions if you plan to use role-based access control.
  • Accurate user mapping ensures that login, signup and token generation work correctly with your database schema.