What you'll learn
How to simplify Row-Level Security using
crudPolicyCommon RLS patterns with Drizzle
How to use custom Postgres roles with your policies
How to use Drizzle RLS with the Data API
How to use Drizzle RLS with the serverless driver
Row-Level Security (RLS) is an important last line of defense for protecting your data at the database level. It ensures that users can only access the data they are permitted to see. When exposing your database directly to clients (for example, through the Data API), RLS policies are highly recommended to keep your data secure.
However, implementing RLS natively requires writing and maintaining separate SQL policies for each table, and often for each CRUD operation (Create, Read, Update, Delete). This can quickly become tedious and error-prone.
Drizzle ORM provides a declarative way to manage these policies directly within your TypeScript database schema, making them much easier to write, review, and maintain. Once you define policies in your Drizzle schema and run migrations, they are automatically created in your Postgres database and reliably enforced for all queries.
The baseline: RLS in plain SQL
Before seeing how Drizzle simplifies things, it helps to understand the underlying SQL it replaces. Below is a sample schema for a basic todo application, where users should only be able to view and manage their own tasks:
CREATE TABLE IF NOT EXISTS "todos" (
"id" bigint PRIMARY KEY,
"user_id" text DEFAULT (auth.user_id()) NOT NULL,
"task" text NOT NULL,
"is_complete" boolean DEFAULT false NOT NULL
);
-- This boilerplate SQL code is required for every table you want to secure
ALTER TABLE "todos" ENABLE ROW LEVEL SECURITY;
CREATE POLICY "manage todos" ON "todos"
FOR ALL
TO "authenticated"
USING ((select auth.user_id()) = user_id);These SQL policies guarantee strict, per-user access control at the database level. The USING clause defines the condition under which a row is accessible (readable). Since WITH CHECK is omitted, Postgres automatically applies the USING condition to also restrict inserts and updates.
Understanding authentication context
Notice the auth.user_id() function in the SQL above. When you use Neon's Data API alongside your database, this function automatically extracts the user identifier from the active JWT claims. This makes the authenticated user's identity securely available directly in your database policies without needing extra backend logic.
While this plain SQL approach is secure and explicit, managing multiple policies across many tables can become repetitive. Drizzle's declarative crudPolicy and pgPolicy helpers eliminate this boilerplate, letting you define your security logic directly alongside your tables for better maintainability.
Simplifying RLS with crudPolicy
Drizzle provides a convenient crudPolicy helper to simplify the creation of RLS policies. With crudPolicy, you can achieve the same result declaratively. For example:
import { pgTable, text, bigint, boolean } from 'drizzle-orm/pg-core';
import { crudPolicy, authenticatedRole, authUid } from 'drizzle-orm/neon';
import { sql } from 'drizzle-orm';
export const todos = pgTable(
'todos',
{
id: bigint('id', { mode: 'number' }).primaryKey(),
userId: text('user_id')
.notNull()
.default(sql`(auth.user_id())`),
task: text('task').notNull(),
isComplete: boolean('is_complete').notNull().default(false),
},
(table) => [
// Apply RLS policies for the 'authenticated' role
crudPolicy({
role: authenticatedRole,
read: authUid(table.userId), // Users can only read their own todos
modify: authUid(table.userId), // Users can only create, update, or delete their own todos
}),
]
);note
About Drizzle's role: Drizzle is used to declare and migrate RLS policies in TypeScript. When migrations are run, these policies are created in your Postgres database and enforced automatically regardless of how queries are executed.
You can run queries that respect these policies using either the Data API client (frontend) or the Neon serverless driver using the Drizzle query builder (backend).
Configuration parameters
The crudPolicy function from drizzle-orm/neon is a high-level helper that declaratively generates Row-Level Security (RLS) policies for your tables. It accepts the following parameters:
role: The Postgres role or array of roles the policy applies to. Neon providesauthenticatedRoleandanonymousRoleout of the box, but you can also use custom roles.read: Controls access toSELECToperations. Accepts:trueto allow all reads for the rolefalseto deny all reads- a custom SQL expression for fine-grained access (for example,
authUid(table.userId)) nullto skip generating aSELECTpolicy
modify: Controls access toINSERT,UPDATE, andDELETEoperations. Accepts:trueto allow all modificationsfalseto deny all modifications- a custom SQL expression for conditional access (for example,
authUid(table.userId)) nullto skip generating policies for these operations
The crudPolicy helper generates an array of RLS policy definitions for all CRUD operations (select, insert, update, delete) based on these parameters. For most use cases, this lets you express common access patterns with minimal boilerplate.
The
authUid(column)helper generates the SQL condition(select auth.user_id() = column), which is used to restrict access to rows owned by the current user for use inreadandmodifypolicies.
Fine-grained control with pgPolicy
While crudPolicy is ideal for scenarios where a role has the same permissions for reading and modifying data, there are cases where you need more granular control. For these situations, you can use Drizzle's pgPolicy function, which provides the flexibility to define custom policies for each operation.
Using pgPolicy is ideal when you need to:
- Define different logic for
INSERTvs.UPDATEoperations. - Create a policy for a single command, like
DELETEonly. - Implement complex conditions where the
USINGandWITH CHECKclauses differ significantly.
For example, you might want to allow only users with an admin role to update or delete rows in a table, while regular users can insert new rows and view only their own data. This kind of scenario where different roles have different permissions for each operation is easy to express using pgPolicy, giving you fine-grained control over who can perform which actions on your data.
Replicating crudPolicy with pgPolicy
To understand how pgPolicy works, let's rewrite the todos example using it. The following pgPolicy definition is exactly what crudPolicy would generate from your simpler configuration.
import { pgTable, text, bigint, boolean, pgPolicy } from 'drizzle-orm/pg-core';
import { authenticatedRole, authUid } from 'drizzle-orm/neon';
import { sql } from 'drizzle-orm';
export const todos = pgTable(
'todos',
{
id: bigint('id', { mode: 'number' }).primaryKey(),
userId: text('user_id')
.notNull()
.default(sql`(auth.user_id())`),
task: text('task').notNull(),
isComplete: boolean('is_complete').notNull().default(false),
},
(table) => {
return [
// Single policy for all CRUD operations
pgPolicy('manage todos', {
for: 'all',
to: authenticatedRole,
using: authUid(table.userId), // users can only access their own todos
}),
];
}
);This single pgPolicy definition with for: 'all' is exactly what crudPolicy would generate from your simpler configuration. Note that withCheck is omitted because when it's not specified, PostgreSQL automatically uses the USING clause for both read and write checks. This eliminates unnecessary repetition while maintaining the same security guarantees.
You can apply this approach to additional tables and operations, allowing you to define increasingly sophisticated and tailored security policies as your application's requirements evolve.
Example: Time limited updates
Here is how you can implement a rule that crudPolicy can't handle alone: A user can update their todo, but only within 24 hours of creating it. They should still be able to view and delete it anytime.
This requires a different WITH CHECK condition for UPDATE than the USING condition.
import { pgTable, text, bigint, timestamp, pgPolicy, boolean } from 'drizzle-orm/pg-core';
import { authenticatedRole } from 'drizzle-orm/neon';
import { sql } from 'drizzle-orm';
export const todos = pgTable(
'todos',
{
id: bigint('id', { mode: 'number' }).primaryKey(),
userId: text('user_id')
.notNull()
.default(sql`(auth.user_id())`),
task: text('task').notNull(),
isComplete: boolean('is_complete').notNull().default(false),
createdAt: timestamp('created_at', { withTimezone: true }).defaultNow().notNull(),
},
(table) => {
const userOwnsTodo = sql`(select auth.user_id() = ${table.userId})`;
// Condition for updates: user must own the todo AND it must be less than 24 hours old.
const canUpdateTodo = sql`(${userOwnsTodo} and ${table.createdAt} > now() - interval '24 hours')`;
return [
// View policy remains the same.
pgPolicy('view todos', {
for: 'select',
to: authenticatedRole,
using: userOwnsTodo,
}),
// Insert policy also remains the same.
pgPolicy('create todos', {
for: 'insert',
to: authenticatedRole,
withCheck: userOwnsTodo,
}),
// Delete policy remains the same.
pgPolicy('delete todos', {
for: 'delete',
to: authenticatedRole,
using: userOwnsTodo,
}),
// The update policy now has a different, stricter WITH CHECK condition.
pgPolicy('update todos (time-limited)', {
for: 'update',
to: authenticatedRole,
using: userOwnsTodo, // User must own the row to even attempt an update.
withCheck: canUpdateTodo, // The updated row must satisfy this stricter condition.
}),
];
}
);This example demonstrates how pgPolicy gives you precise, command-level control over your security rules, making it easy to implement complex business logic directly in your database schema.
Securing database views with RLS
Row-Level Security (RLS) can also be enabled on Postgres views, allowing you to control access to view data at the row level. For details on how to enable RLS on views and apply policies using Drizzle, refer to the Drizzle documentation. This approach makes it possible to expose curated or joined subsets of your data while ensuring users only see the rows they are authorized to access.
Common RLS patterns
Using crudPolicy and pgPolicy, you can implement a variety of security models. Here are some of the most common ones:
User-Owned Data
This is the most common RLS pattern, where each user can access only the records they own. It's ideal for applications such as personal to-do lists, user profile settings, or any scenario where users should have full control over their own data and no visibility into others' information. As demonstrated in the todos example above, this approach ensures strict data isolation and privacy.
A typical crudPolicy and a pgPolicy for this scenario might look like:
[
crudPolicy({
role: authenticatedRole,
read: authUid(table.userId),
modify: authUid(table.userId),
}),
];Role-based access control
Assign different permissions to anonymous users and authenticated users. For example, in a blog application, anyone can read posts, but only authenticated users can modify their own content. This setup uses separate policies for the anonymousRole (public read access) and the authenticatedRole (user-specific modifications), making it ideal for applications that distinguish between public and logged-in user actions.
A typical Drizzle schema with crudPolicy and pgPolicy for this scenario might look like:
import { sql } from 'drizzle-orm';
import { crudPolicy, authenticatedRole, authUid, anonymousRole } from 'drizzle-orm/neon';
import { bigint, boolean, pgTable, text } from 'drizzle-orm/pg-core';
export const posts = pgTable(
'posts',
{
id: bigint({ mode: 'number' }).primaryKey().generatedAlwaysAsIdentity(),
userId: text('user_id')
.notNull()
.default(sql`(auth.user_id())`),
content: text().notNull(),
published: boolean().notNull().default(false),
},
(table) => [
// Public read access
crudPolicy({
role: anonymousRole,
read: true, // Anyone can read
modify: false, // No one can modify anonymously
}),
// Policy for authenticated users
crudPolicy({
role: authenticatedRole,
read: true, // Can also read all posts
modify: authUid(table.userId), // Can only modify their own posts
}),
]
);Complex relationships & shared data
Secure data based on relationships in other tables, such as allowing access to a shared document only if the user is part of a specific group or project. This often involves more complex SQL queries and may require additional metadata to be stored alongside your main data.
This is where Drizzle really helps: expressing these relationship based policies declaratively in your schema is much less error-prone and far easier to maintain than writing raw SQL policies by hand.
For example, suppose you have a notes table and a paragraphs table that contains the text of each note. You want to ensure that users can only access paragraphs from notes they own or that are shared with them.
import { sql } from 'drizzle-orm';
import { crudPolicy, authenticatedRole, authUid } from 'drizzle-orm/neon';
import { boolean, pgPolicy, pgTable, text, uuid } from 'drizzle-orm/pg-core';
export const notes = pgTable(
'notes',
{
id: uuid('id').defaultRandom().primaryKey(),
ownerId: text('owner_id')
.notNull()
.default(sql`auth.user_id()`),
title: text('title').notNull().default('untitled note'),
shared: boolean('shared').default(false),
},
(table) => [
// Users can only access their own notes
crudPolicy({
role: authenticatedRole,
read: authUid(table.ownerId),
modify: authUid(table.ownerId),
}),
// Shared notes are visible to authenticated users
pgPolicy('shared_policy', {
for: 'select',
to: authenticatedRole,
using: sql`${table.shared} = true`,
}),
]
);
export const paragraphs = pgTable(
'paragraphs',
{
id: uuid('id').defaultRandom().primaryKey(),
noteId: uuid('note_id').references(() => notes.id),
content: text('content').notNull(),
},
(table) => [
// Users can only access paragraphs from their own notes
crudPolicy({
role: authenticatedRole,
read: sql`(select notes.owner_id = auth.user_id() from notes where notes.id = ${table.noteId})`,
modify: sql`(select notes.owner_id = auth.user_id() from notes where notes.id = ${table.noteId})`,
}),
// Shared note paragraphs are visible to authenticated users
pgPolicy('shared_policy', {
for: 'select',
to: authenticatedRole,
using: sql`(select notes.shared from notes where notes.id = ${table.noteId})`,
}),
]
);In this example:
- Users can only access paragraphs from notes they own or that are shared with them.
- Shared paragraphs are visible to authenticated users.
This pattern can be adapted for other relationship-based access controls, such as project teams, organization memberships, or shared resources.
Executing queries with RLS policies
Once your RLS policies are defined in your Drizzle schema, you can choose the appropriate client based on your application:
- Use the Data API client for frontend applications
- Use the Neon serverless driver for backend applications. For a deeper dive, see Run RLS queries with Drizzle ORM.
Need help?
Join our Discord Server to ask questions or see what others are doing with Neon. For paid plan support options, see Support.








