Automatically monitor authentication events from your Supabase project. Track signups, logins, and detect suspicious activity — all with zero code changes.
Connect your Supabase project in under 2 minutes.
Navigate to your LiteSOC dashboard and click on the Marketplace tab in Settings.
https://litesoc.io/dashboard/marketplaceFind the Supabase integration card and click the connect button. You'll be redirected to Supabase to authorize LiteSOC.
Grant LiteSOC permission to read your projects and create database webhooks. We only request the minimum permissions needed.
Permissions requested:
projects:read — List your projectsdatabase:read — Read database schemadatabase:write — Create webhook triggerLiteSOC automatically creates a webhook on your auth.users table. Every signup and login is now tracked in your security dashboard.
The Supabase integration automatically maps auth events to LiteSOC's standard event format.
auth.signup_successTriggered when a new user signs up via Supabase Auth
auth.login_successTriggered when a user successfully logs in
auth.password_resetTriggered when a user requests a password reset
auth.mfa_enabledTriggered when a user enables multi-factor authentication
auth.mfa_disabledTriggered when a user disables multi-factor authentication
admin.user_deletedTriggered when a user account is deleted
Want Impossible Travel & Behavioral Detection?
Database webhooks don't include IP addresses or device context. For advanced features like Impossible Travel Detection, Behavioral Anomalies, and GeoIP Enrichment, integrate the LiteSOC SDK into your auth flow.
🚀 Enable Behavioral AI with 1-Click Edge Function
Deploy our ready-to-use Supabase Edge Function to capture IP addresses and enable Impossible Travel, Geo Anomaly, and VPN/Tor Detection on login events.
Note: Brute force detection requires tracking failed logins via the SDK, as Supabase hooks only fire on successful auth.
View Edge Function TemplateUser signs up or logs in to your app via Supabase Auth
Supabase triggers a webhook on INSERT to auth.users
Event is logged to your security dashboard with user details and timestamp
No. The webhook is asynchronous and non-blocking. Your auth operations complete before the webhook is sent, so there's zero impact on user experience.
Your Supabase Auth continues to work normally. Webhook failures don't affect your authentication flow. Events may be retried by Supabase automatically.
Yes! The Supabase integration handles auth events automatically, but you can also send custom events using our REST API or SDKs.
No — database webhooks don't include IP addresses or device context needed for geolocation-based detection. For Impossible Travel, Behavioral Anomalies, and Brute Force Detection, integrate the LiteSOC SDK into your auth flow.
Supabase doesn't write failed login attempts to the database, so they can't be tracked via webhooks. Use the SDK to capture auth.login_failed events from your client or server.
Go to Settings → Marketplace and click "Disconnect" on the Supabase card. This removes the webhook from your Supabase project and stops event tracking.
Connect in 2 minutes and start monitoring authentication security instantly.