Heimdall
Multi-tenant auth without the sprint.
Heimdall is the auth layer for products that need tenancy on day one. Users, roles, machine-to-machine tokens, and audit logs, all behind one REST API. Tokens are scoped and signed per app, so the isolation between tenants is a property of the token, not a policy check.
Most auth stacks split in half: consumer widgets that crack once you need tenancy, or enterprise IdPs that take a quarter to wire up. Heimdall sits in the middle. Opinionated enough to ship in an afternoon. Flexible enough to run thousands of tenants without a rewrite.
No SDK, no dashboard-driven config. Every operation is an HTTP call with a JSON body. If your stack can POST, it can use Heimdall. And every ProductCraft product runs on it — we eat our own tenancy model.
Capabilities
Core features
Everything you need to add production-grade auth to a multi-tenant application. Nothing you don’t.
Machine-to-machine tokens
Multi-tenancy with Apps
Role-based access control
User management
Invite flows
Audit logging
Integration
How it works
A typical integration takes three steps: create an App for your tenant, issue tokens for your users or services, and check permissions on each request.
Create an App (tenant)
Register a new tenant in Heimdall. This creates an isolated namespace with roles and permissions provisioned automatically.
{
"slug": "acme-corp",
"displayName": "Acme Corporation"
}Issue a token
Authenticate a user or service and receive a signed JWT. Users sign in with email and password or social login. Services exchange client credentials.
{
"clientId": "m2m_a1b2c3d4...",
"clientSecret": "base64url-secret"
}Check permissions
Verify the token and check whether the caller has the required permission. One call, no database lookup needed.
{
"token": "eyJhbGciOiJSUzI1NiIs...",
"permission": "user.read"
}
→ { "allowed": true, "role": "admin" }Under the hood
Technical details
Here is what matters for your integration.
REST-first design
JWT-based authentication
Tenant-scoped data isolation
LLM-friendly surface
Horizontal scaling
Use cases
Built for these workloads
SaaS with team workspaces
Internal tools with service accounts
Marketplaces and platforms
AI agent backends
Skip the auth sprint
The quickstart goes from zero to a signed token in under ten minutes. Create an App, issue a token, verify it against the JWKS endpoint — all with copy-paste curl.