Skip to content

Kerberos Authentication

dbeaver-devops edited this page Nov 7, 2024 · 1 revision

Note: This feature is available in Enterprise, AWS, Team editions only.

Table of contents

Overview

CloudBeaver includes support for Kerberos authentication, enabling secure connections to your databases.

Supported databases

  • AlloyDB for PostgreSQL
  • CockroachDB
  • Fujitsu Enterprise Postgres
  • Greenplum
  • SAP HANA
  • MariaDB
  • Oracle Database
  • PostgreSQL
  • MySQL
  • Amazon Redshift
  • Teradata
  • TimescaleDB
  • Trino (formerly PrestoSQL)
  • Yellowbrick Data Warehouse
  • YugabyteDB

Settings

Here are the steps to configure Kerberos authentication:

  1. From the Authentication dropdown menu, select the Kerberos method.

  2. Fill in the following fields:

    Setting Description
    User name Specifies the name of the user or role within the database.
    User password The password associated with your Kerberos user.
    Kerberos user name A unique identity in the Kerberos system to which Kerberos can assign tickets, enabling access to services that are Kerberos-aware.
    Realm name The domain over which a Kerberos authentication server can authenticate users, hosts, or services. It's often the uppercase version of the DNS domain name it oversees.
    KDC server The hostname of your Kerberos Key Distribution Center (KDC), which is a service that provides session tickets and keys within an Active Directory domain.

    Tip: If you check the Save credentials for the current user option, you will not be asked to input your credentials every time you connect.

  3. Once you have input your credentials, click the Test button to verify your settings. If everything is configured correctly, CloudBeaver should now be able to connect to your database using the Kerberos authentication method.

CloudBeaver Documentation

User Guide

Installation

Configuration

CloudBeaver AWS

CloudBeaver Enterprise Edition

Deployment

Clone this wiki locally