-
Notifications
You must be signed in to change notification settings - Fork 406
Kerberos Authentication
dbeaver-devops edited this page Nov 7, 2024
·
1 revision
Note: This feature is available in Enterprise, AWS, Team editions only.
CloudBeaver includes support for Kerberos authentication, enabling secure connections to your databases.
- AlloyDB for PostgreSQL
- CockroachDB
- Fujitsu Enterprise Postgres
- Greenplum
- SAP HANA
- MariaDB
- Oracle Database
- PostgreSQL
- MySQL
- Amazon Redshift
- Teradata
- TimescaleDB
- Trino (formerly PrestoSQL)
- Yellowbrick Data Warehouse
- YugabyteDB
Here are the steps to configure Kerberos authentication:
-
From the Authentication dropdown menu, select the Kerberos method.
-
Fill in the following fields:
Setting Description User name Specifies the name of the user or role within the database. User password The password associated with your Kerberos user. Kerberos user name A unique identity in the Kerberos system to which Kerberos can assign tickets, enabling access to services that are Kerberos-aware. Realm name The domain over which a Kerberos authentication server can authenticate users, hosts, or services. It's often the uppercase version of the DNS domain name it oversees. KDC server The hostname of your Kerberos Key Distribution Center (KDC), which is a service that provides session tickets and keys within an Active Directory domain. Tip: If you check the Save credentials for the current user option, you will not be asked to input your credentials every time you connect.
-
Once you have input your credentials, click the Test button to verify your settings. If everything is configured correctly, CloudBeaver should now be able to connect to your database using the Kerberos authentication method.
- Application overview
-
License Management
- Demo Server
- Supported databases
- Administration
- Server configuration
- Create Connection
- Network configuration settings
- Connection Templates Management
- Access Management
-
Authentication methods
-
Local Access Authentication
- Anonymous Access Configuration
- Reverse proxy header authentication
- LDAP
-
Single Sign On
-
SAML
-
OpenID
-
AWS OpenID
-
AWS SAML
-
AWS IAM
-
AWS OpenId via Okta
-
Snowflake SSO
-
Okta OpenId
-
Cognito OpenId
-
JWT authentication
-
Kerberos authentication
-
NTLM
-
Microsoft Entra ID authentication
-
Google authentication
-
Local Access Authentication
- User credentials storage
- Cloud databases configuration
-
Query Manager
-
Drivers Management
- Accessibility
- Keyboard shortcuts
- Features
- Server configuration
-
Domain manager
- Product configuration parameters
- Command line parameters
- Local Preferences
- API
- Deployment options
- Additional setup and management