Replies: 2 comments 3 replies
-
thanks for opening this topic @teq0. We're in the process of re-thinking exposed APIs and we'll take this points into consideration. We'll share the initial proposals for an open discussion and contributions |
Beta Was this translation helpful? Give feedback.
0 replies
-
Meanwhile, it's up to the application interacting with immudb server to choose what information to place into the database e.g. you may have a middleware or proxy service that is augmenting the data to be ultimately stored into immudb database |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I've been searching the docs and I can't see anything about this. It's important to know that a value/row hasn't been tampered with but it's equally important to know who changed something and when.
This is not the "audit" function (detecting tampering), but it's something an auditor (as in a person) will want to know.
Beta Was this translation helpful? Give feedback.
All reactions