Why Postrges developers choose Supabase
Supabase provides full access to Postgres. Use additional components, or just use the database. No proprietary tooling, no vendor lock-in. Supabase is Postgres the way you want it.
Full Postgres
Connect to Supabase via sql, pgAdmin, or any standard Postgres client. Use native Postgres extensions. Employ Row-Level Security, not a bolt-on permission system.
Complete development platform
Supabase offers a fully integrated suite of tools including authentication, storage, edge functions, real-time subscriptions, and vector search. Developers don’t have to stitch together multiple services. Use one or all.
Scalable and dependable
Keep your workflows, tools, and database expertise. Self-host if you need it. Full deployment if you prefer, including automated backups, Point-in-Time Recovery (PITR), and fine-tuned observability via query logs, pg_stat_activity, and EXPLAIN ANALYZE.
Supabase is the Postgres platform you control
Supabase includes everything you need to create the perfect app for your brand, business, or just for fun.
Database
A fully managed Postgres database.
No forks: 100% pure Postgres.
- 100% portable
- Built-in Auth with RLS
- Easy to extend
NAME | PUBLICATION |
---|---|
Jon Meyers | All |
Chris Martin | All |
Amy Quek | No |
Riccardo Bussetti | No |
Beng Eu | All |
Tyler Hillery | All |
Authentication
Secure authentication with email/password, magic links, OAuth (Google, GitHub, Twitter, etc.), SAML, SSO, and phone/SMS OTP.
Role-Based Access Control
Secure your data properly.
Realtime
Postgres replication enables live sync functionality for collaborative applications.
Storage
Scalable S3-compatible object storage for managing files, images, and videos.
Edge Functions
Serverless functions powered by Deno, deployed globally for low-latency execution.
Vectors
pgvector extensionfor AI/ML applications, enabling fast semantic search and embedding storage.
Row Level Security
Granular access control policies to secure data at the row level.
Full SQL access
Supabase supports CTEs, triggers, foreign keys, JSONB, full-text search, and more.
Postgres functions
Run backend logic in the database if you prefer using stored procedures, PL/pgSQL, and custom functions.
Postgres extensions
Tap into the full Posgres ecosystem, including pgvector, PostGIS, pg_stat_statements, and over XX more Postgres extensions.
Developers can build faster with Supabase
Features that help developers move quickly and focus.
AI Assistant
A single panel that persists across the Supabase Dashboard and maintains context across AI prompts.
AI Assistant
Entity: Auth
Schema:
Issue: We have detected that you have enabled the email provider with an expiry time of more than an hour. It is recommended to set this value to less th...
MCP Server
Connect your favorite AI tools such as Cursor or Claude directly with Supabase.
Auto-generated APIs
Learn SQL when you're ready. In the meantime, Supabase generates automatic APIs to make coding a lot easier.
Foreign Data Wrappers
Connect Supabase to Redshift, BigQuery, MySQL, and external APIs for seamless integrations.
Instant and secure deployment
No need to set up servers, manage DevOps, or tweak security settings.
Observability
Built-in logs, query performance tools, and security insights for easy debugging.
Top performance,
at any scale
Supabase ensures optimal database performance at any scale, so you can focus on innovating and growing without worrying about infrastructure limitations — whether you're handling high-traffic applications, complex queries, or massive data volumes.
6,500,000+
35,000+
Postgres at its core
ACID-compliant, battle-tested database trusted by enterprises and startups.
Horizontal & Vertical Scaling
Scale compute and storage independently, including support for read replicas.
Multi-region Deployments
Deploy databases across multiple regions for global availability.
High Availability Architecture
Enterprise plans offer automatic failover and redundancy for mission-critical applications.
Point-in-Time Recovery
Restore your database to any point in time for disaster recovery.
Automatic Backups
Daily backups with retention policies for added security.
Trusted for medical records, missions to the moon, and everything in between
Keep your data secure with SOC 2, HIPAA, and GDPR compliance. Your customers' data is encrypted at rest and in transit, with built-in tools for monitoring and managing security threats.
SOC 2 Type II certified
HIPAA compliance
DDoS Protection
Multi-factor Authentication
Vulnerability Management
Role-based access control
Database Audit Logs
Security Advisors
Encrypted Storage
Network restrictions
Choose your platform to start building in seconds
Or, start with Supabase AI Prompts
1. Install @supabase/supabase-js and @supabase/ssr packages. 2. Set up environment variables. 3. Write two utility functions with `createClient` functions to create a browser client and a server client. 4. Hook up middleware to refresh auth tokens
1. Try to use Web APIs and Deno’s core APIs instead of external dependencies (eg: use fetch instead of Axios, use WebSockets API instead of node-ws) 2. If you are reusing utility methods between Edge Functions, add them to 'supabase/functions/_shared' and import using a relative path. Do NOT have cross dependencies between Edge Functions. 3. Do NOT use bare specifiers when importing dependecnies. If you need to use an external dependency, make sure it's prefixed with either 'npm:' or 'jsr:'. For example, '@supabase/supabase-js' should be written as 'npm:@supabase/supabase-js'. 4. For external imports, always define a version. For example, 'npm:@express' should be written as 'npm:express@4.18.2'. 5. For external dependencies, importing via 'npm:' and 'jsr:' is preferred. Minimize the use of imports from @'deno.land/x' , 'esm.sh' and @'unpkg.com' . If you have a package from one of those CDNs, you can replace the CDN hostname with 'npm:' specifier.
Mandatory Instructions for Supabase Declarative Schema Management ## 1. **Exclusive Use of Declarative Schema** -**All database schema modifications must be defined within '.sql' files located in the 'supabase/schemas/' directory.
You're a Supabase Postgres expert in writing row level security policies. Your purpose is to generate a policy with the constraints given by the user. You should first retrieve schema information to write policies for, usually the 'public' schema. The output should use the following instructions: - The generated SQL must be valid SQL.