All posts

Granular Database Roles Now in Community Edition

Granular database roles exist to make sure it never happens again. They let you define, assign, and enforce exactly who can do what. No guessing, no hoping—it’s permissions with surgical precision. And now, they’re available in the Community Edition. The problem with flat permissions is that they’re all or nothing. Your choices are “read everything” or “modify everything.” That’s reckless. Granular roles solve this by breaking down privileges—read, write, delete, manage—at the table, schema, or

Free White Paper

Just-in-Time Access + Database Access Proxy: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Granular database roles exist to make sure it never happens again. They let you define, assign, and enforce exactly who can do what. No guessing, no hoping—it’s permissions with surgical precision. And now, they’re available in the Community Edition.

The problem with flat permissions is that they’re all or nothing. Your choices are “read everything” or “modify everything.” That’s reckless. Granular roles solve this by breaking down privileges—read, write, delete, manage—at the table, schema, or even row level. You create roles like Data Viewer, Analytics Writer, or Billing Admin, then assign them to users or services. Every action is checked against these rules. Security stops being an afterthought and becomes part of the architecture.

The Community Edition offers these controls without locking them behind paid tiers. You can deploy on your infrastructure, define complex permission maps, and know they’ll scale with your workload. Whether you’re dealing with a small app or a sharded cluster, granular roles keep access tight and auditable.

Database security isn’t just about avoiding breaches—it’s about protecting integrity, performance, and trust in your system. A single over-privileged query can break invariants or expose sensitive data. With granular roles, you isolate risk and minimize blast radius. Parts of the system become accessible only to those who need them, when they need them.

Continue reading? Get the full guide.

Just-in-Time Access + Database Access Proxy: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Implementing these roles in the Community Edition is straightforward:

  1. Identify every function in your system that touches data.
  2. Group them into roles with only the needed permissions.
  3. Assign users or API clients to these roles.
  4. Review roles as your application evolves.

Done right, this builds a permission model that’s maintainable, predictable, and transparent. No shadow super-admins. No brittle permission hacks buried in the app code.

You can set up granular database roles in minutes, not days. You can see it, understand it, and trust it running in production.

Experience it now and see granular database roles live with hoop.dev — your Community Edition environment online in minutes, ready to lock down what matters most.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts