Documentation Index
Fetch the complete documentation index at: https://quintsecurity.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Multi-Tenancy
Quint uses a shared infrastructure, logical isolation model. Every database table includes atenant_id column, and Postgres Row Level Security (RLS) enforces isolation at the database level. Application code never constructs WHERE tenant_id = $1 clauses — the database handles it transparently.
Isolation Model
Database: Row Level Security
All tenant isolation is enforced by Postgres RLS. Before any query, the application sets the current tenant context:WHERE tenant_id = $1 clauses — this eliminates an entire class of data-leak bugs.
SNS + SQS: Per-Tenant org_id Stamping
All event streaming uses AWS SNS FIFO → SQS fan-out. The ingest service stamps every event with org_id from the authenticated deploy token before publishing, and MessageGroupId = session_id preserves per-session FIFO ordering. Isolation is enforced downstream by Postgres RLS, not by per-tenant topics.
See Ingestion for the fan-out diagram.
Redis: Per-Tenant Key Prefix
All cached data uses a per-tenant key prefix:API: Middleware-Based Context
Tenant context is extracted from the authenticated token in API middleware, before any database query executes:- Request arrives with auth token
- Middleware extracts
tenant_idfrom the token claims SET LOCAL app.current_tenant_idis called on the database connection- All subsequent queries in the request are automatically scoped to the tenant
Request Flow
Postgres Tables with RLS
All security-critical tables have RLS policies enabled:| Table | Description | Notes |
|---|---|---|
tenants | Tenant registry | Root table for tenant metadata |
agents | Registered AI agents | Per-tenant agent inventory |
actions | Intercepted agent actions | Partitioned by month for performance |
policies | Enforcement policies | Per-tenant policy rules |
alerts | Security alerts | Triggered by policy violations |
deploy_tokens | Daemon deployment tokens | Used for on-device daemon registration |
actions table is partitioned by month to maintain query performance as event volume grows.
Tenant Onboarding Flow
Daemon Registers
The daemon presents the deploy token to the API, which verifies it and registers the device under the tenant.
Data Residency
Quint follows a cloud metadata, on-device secrets model:- On-device: All security-critical data (source code, credentials, file contents) stays on the device. The daemon never transmits raw secrets.
- Cloud: Receives structured metadata only — action types, risk scores, tool names, timestamps, and policy verdicts.