SINGLE CONNECT
...
3.4 SQL Proxy
3.4.1 Defining User/Device/Policy for SQL Proxy
6 min
you can use the single connect sql proxy feature to log and mask oracle, mssql, mysql and cassandra sessions the single connect sql proxy can also enforce policy rules to sql queries the queries executed by users are indisputably logged adding sql users the usernames that will used in the database connection must be created on single connect 1\ log in to the single connect gui 2\ navigate to user management > user accounts 3\ open the user definition tab 4\ enter username, password, name and email address 5\ save creating user group 1\ log in to the single connect gui 2\ navigate to user management > user accounts 3\ open the user group definition tab 4\ enter group name and select users 5\ save adding device group 1\ log in to the single connect gui 2\ navigate to device management > device groups 3\ enter group name 4\ save adding device realm the device realm must be created to determine which user group is authorized to which device group 1\ log in to the single connect gui 2\ navigate to device management > device groups 3\ select device group realms 4\ enter realm name and, select user group(s) and device group(s) 5\ save check managing devices chapter for more information on creating device group realms adding database 1\ log in to the single connect gui 2\ navigate to device management > device inventory menu 3\ click the new device discovery button 4\ enter ip address, port and protocol and select the device group for the assigned device to be in 5\ click the discover and add button the port number is the identifier of the connection to mssql, casandra, mysql, teradata and postgresql database via an sql proxy feature of single connect the port number must be defined from device properties for mssql, cassandra, mysql, teradata and postgresql database 1\ log in to the single connect web gui 2\ navigate to device management > device inventory 3\ right click on the defined database device and select show properties 4\ set the “sql proxy bind port” property note multiple bind ports can be added using the comma “,” separator for ex 4042,4141,1313 creating an sql policy the execution of queries can be prevented or allowed 1\ log in to the single connect gui 2\ navigate to policy control > session policy 3\ open the policy key tab 4\ enter the query (or regex) to prevent or allow 5\ select the policy type and element type 6\ save creating a policy group 1\ log in to the single connect gui 2\ navigate to policy control > session policy 3\ open the policy group tab 4\ enter the policy group name and select the policy/policies and masking rule(s) 5\ select the operation mode and action type 6\ save creating a policy realm 1\ log in to the single connect gui 2\ navigate to policy control > session policy 3\ open the policy realm tab 4\ enter policy realm name and select the policy group and device realm 5\ save note at least one policy key must be assigned to the related realm for the sql proxy