Start
Introduction, Quickstart, and the demo schema. From a single `docker run` command to a policy-protected query in under 15 minutes.
Get started
A fully customizable data access governance layer — install, configure, and operate the SQL-aware proxy that enforces fine-grained access policies in real-time.
TIP
Pin your Docker image to a specific version tag (e.g., ghcr.io/getbetweenrows/betweenrows:0.16.2) rather than :latest so upgrades stay deliberate.
Start with the Security Overview — a curation page that frames the threat model, trust boundaries, and deployment checklist, then links to the detailed concept and reference pages. Then skim Architecture, Policy Model, and Known Limitations.
Start with the Quickstart — it walks from a single docker run command to a working policy-protected query in under 15 minutes. Then read the Write your first row filter guide and the Multi-tenant isolation flagship tutorial.