The query hit the database, but one column was missing. Not by accident. By design.
Identity-Aware Proxy Column-Level Access makes this possible. It enforces access rules at the most granular level—the column—based on who the user is, not just what role they have. This control lives between the application and the backend, blocking sensitive fields before they ever leave the data store.
Traditional access control stops at table-level or row-level. If a user can query a row, they can see every column in it. That’s a problem for systems holding mixed-sensitivity data in the same table. Names, emails, SSNs, payment tokens—often they live side-by-side. Column-level access ensures you can share the data you must without leaking what you can’t.
An identity-aware proxy evaluates requests in real time. It authenticates the user, matches against policies, and strips or masks columns they are not cleared to see. These policies can map directly to identity provider attributes, like group memberships, roles, or custom claims. The result is dynamic, enforceable security without rewriting your application queries.