Quint’s auth system is built on two layers: Supabase handles user identity, and Quint’s API manages organizations, roles, and tokens.Documentation Index
Fetch the complete documentation index at: https://quintsecurity.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Authentication
User authentication flows through Supabase with two methods:- Email/password — standard signup with email confirmation
- OAuth providers — Google and GitHub SSO
Authorization header. The API validates the token, resolves the user’s org membership, and enforces role-based permissions.
Organization Provisioning
Orgs are created lazily. When a user first authenticates and has no org membership, Quint automatically:
No manual org creation step. Users land in a working environment immediately.
Role-Based Access Control
Every org member has one of four roles, enforced on every API call:| Role | Level | Purpose |
|---|---|---|
| Owner | 3 | Full control including billing, SSO, and org deletion |
| Admin | 2 | Manage team, tokens, policies, and fleet |
| Analyst | 1 | Investigate alerts, acknowledge events, view all data |
| Viewer | 0 | Read-only access to dashboards and sessions |
Token-Based Auth
Agents and integrations authenticate with tokens instead of JWTs. Three token types cover different use cases:Deploy Tokens
Issued per-device for agent-to-cloud communication. Prefix:
qt_dk_Service Tokens
For CI/CD pipelines and automated integrations. Prefix:
qt_sk_Personal Tokens
For individual API access and scripting. Prefix:
qt_pk_Invite Flow
Team growth follows a claim-based pattern:
No invite links to expire or get lost. The mapping is email-based and persistent until claimed or revoked.
Architecture
All tokens are hashed with SHA-256 before storage. The raw token is shown exactly once at creation time and cannot be retrieved afterward.