Session authentication
SUMit uses session-cookie authentication validated on the server against the database.
Security
This page avoids unsupported compliance and enterprise identity claims. It describes current practices and areas to keep auditing as SUMit grows.
Current practices
The codebase uses server-side auth validation, tenant-aware data patterns, environment separation, and deployment runbooks that call out backup responsibilities.
SUMit uses session-cookie authentication validated on the server against the database.
Server code should apply tenant context to protect workspace data boundaries.
Private secrets stay in server-only environment variables; public values use SvelteKit public env patterns.
The current SQLite-backed deployment model requires disciplined backups and a future Postgres path for higher concurrency.
Send enough detail for investigation, including the affected route, account context, and reproduction steps if possible.