I’ve been thinking about building scalable SaaS applications recently. Many developers struggle with tenant isolation and security when multiple clients share the same application instance. Today, I’ll show you how to create a robust multi-tenant system using NestJS, Prisma, and PostgreSQL’s Row-Level Security. Let’s build this together.
Why focus on this stack? NestJS provides a solid TypeScript foundation, Prisma simplifies database interactions, and PostgreSQL RLS offers database-enforced security. This combination handles data isolation at multiple layers. Ever wonder how large SaaS platforms prevent data leaks between customers? The secret often lies in proper RLS implementation.
First, we initialize our project:
nest new saas-app
npm install @prisma/client prisma
npx prisma init
Our architecture uses a hybrid approach. Smaller tenants share tables with RLS protection, while larger ones get dedicated schemas. Here’s our core configuration interface:
// tenant.types.ts
export interface TenantContext {
tenantId: string;
tenantSlug: string;
schemaName?: string;
}
export interface MultiTenantConfig {
strategy: 'shared' | 'schema-per-tenant' | 'hybrid';
maxTenantsPerInstance: number;
enableRLS: boolean;
}
For database design, we extend Prisma’s capabilities with multi-schema support. Notice the tenantId
field on all tenant-specific models:
// schema.prisma
model Project {
id String @id @default(uuid())
tenantId String
name String
tasks Task[]
@@map("projects")
}
model Task {
id String @id @default(uuid())
tenantId String
projectId String
title String
@@map("tasks")
}
PostgreSQL RLS is where the real isolation happens. We enable policies that restrict data access based on tenant context:
ALTER TABLE projects ENABLE ROW LEVEL SECURITY;
CREATE POLICY tenant_isolation_policy ON projects
FOR ALL USING (tenant_id = current_setting('app.current_tenant'));
In NestJS, we implement tenant-aware middleware to capture context from subdomains or JWT tokens:
// tenant.middleware.ts
@Injectable()
export class TenantMiddleware implements NestMiddleware {
constructor(private prisma: PrismaService) {}
async use(req: Request, res: Response, next: NextFunction) {
const tenantSlug = req.headers['x-tenant-id'] as string;
const tenant = await this.prisma.tenant.findUnique({
where: { slug: tenantSlug }
});
req.tenant = {
id: tenant.id,
schemaName: tenant.schemaName
};
next();
}
}
Managing database connections efficiently is critical. Our dynamic Prisma service switches clients based on tenant context:
// prisma.service.ts
@Injectable()
export class PrismaService implements OnModuleInit {
private tenantClients: Map<string, PrismaClient> = new Map();
async getClient(tenantId: string) {
if (!this.tenantClients.has(tenantId)) {
const client = new PrismaClient({
datasources: { db: { url: this.buildTenantUrl(tenantId) }
});
await client.$connect();
this.tenantClients.set(tenantId, client);
}
return this.tenantClients.get(tenantId);
}
}
Security is non-negotiable. We combine RLS with application-level guards:
// tenant.guard.ts
@Injectable()
export class TenantGuard implements CanActivate {
canActivate(context: ExecutionContext): boolean {
const request = context.switchToHttp().getRequest();
if (!request.tenant) throw new ForbiddenException('Tenant context missing');
return true;
}
}
When onboarding new tenants, we automate schema creation and RLS setup:
// tenant.service.ts
async onboardTenant(name: string) {
const schemaName = `tenant_${generateSlug(name)}`;
await this.createSchema(schemaName);
await this.enableRLS(schemaName);
return this.prisma.tenant.create({
data: { name, schemaName }
});
}
Performance matters at scale. We use connection pooling with PgBouncer and optimize queries:
// project.service.ts
async getProjects(tenantId: string) {
const prisma = await this.prisma.getClient(tenantId);
return prisma.project.findMany({
where: { tenantId },
include: { tasks: { take: 5 } }
});
}
Testing requires special attention. We verify isolation by simulating multi-tenant access:
// project.e2e-spec.ts
it('prevents cross-tenant access', async () => {
const tenant1 = await createTenant();
const tenant2 = await createTenant();
const res = await request(app)
.get('/projects')
.set('X-Tenant-Id', tenant1.id);
expect(res.body).not.toContainEqual(
expect.objectContaining({ tenantId: tenant2.id })
);
});
Common pitfalls? Schema management complexity tops the list. We mitigate this with automated migration scripts and monitoring. Another challenge is connection pooling - too many clients can exhaust database resources. Our dynamic client management helps here.
For deployment, we use Docker containers with environment-specific RLS policies. We monitor tenant databases separately and alert on unusual activity.
What if you need more isolation? Consider dedicated databases for enterprise clients. Though more expensive, it provides maximum separation.
I’ve found this architecture handles most SaaS scenarios effectively. The hybrid approach balances security with operational efficiency. Give it a try for your next multi-tenant project.
If you found this useful, share it with your network. Have questions or suggestions? Let’s discuss in the comments - I’ll respond to every query.