Advanced Search
Search Results
8 total results found
Introduction
This chapter contains introductory sections for the SWAIN platform documentation.
Getting Started
Introduction to SWAIN capabilities and prerequisites.
Setup Steps
This chapter outlines the step-by-step process for setting up your SWAIN backend, covering project creation, connection setup, schema synchronization, authentication configuration, user mapping, social authentication, authorization, and API deployment.
Authentication
This chapter explains the authentication endpoints provided by SWAIN for login, signup, token management, and email verification.
Additional
This chapter covers additional tools and resources for SWAIN, including the command-line interface and testing strategies.
Security
This chapter outlines best practices for securing your SWAIN backend, including recommendations for JWT secret management, token lifetimes, password hashing, protecting routes, restricting database access, securing SMTP credentials, and maintaining audit trail...
Glossary
This chapter provides definitions for common terms and concepts used in SWAIN, such as row-level security (RLS), tenants/accounts, JWTs, and other key terminology to help users understand the platform.