A query hits your database. You don’t trust every eye that will see the rows.
Openshift Row-Level Security (RLS) is the control that decides who sees what. It filters data based on rules. It enforces those rules at the database layer, not in the application code. That means your policy is not optional. Even if a developer forgets to add a WHERE clause, the database still guards the rows.
RLS on Openshift starts with the database engine. PostgreSQL supports CREATE POLICY commands to define visibility. You bind these policies to roles. You define conditions that check user IDs, tenant IDs, or other attributes. Once set, every query obeys the policy. Insert, update, select—every statement is filtered.
Deploying row-level security in Openshift is about isolation and automation. You run your database in a container or cluster on Openshift. You configure RLS in the database schema itself. You keep the logic in version control. When your CI/CD pipeline deploys to Openshift, the database inherits the policies without manual steps.