You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Bytebase itself can run under an IAM role that can connect to Aurora/RDS using the shared IAM-based user.
53
55
54
56
-**Developers authenticate to Bytebase** with their corporate IdP (via SSO). Developers don’t need to see or store any DB credentials. Each developer’s actions are tracked individually in Bytebase.
55
57
56
58
In this model, you don’t have discrete DB users or discrete IAM policies per developer. Bytebase is the gatekeeper, and the real DB connection still use the shared IAM-based user.
57
59
58
-
Below is a brief walkthrough of the setup:
60
+
### JIT Database Access Workflow
59
61
60
-
1.Install Bytebase using Docker on an EC2 instance.
61
-
1.Configure Bytebase to connect to your Amazon Aurora MySQL database (Bytebase also supports other RDS engines).
62
+
1.All users can authenticate to Bytebase with their corporate IdP (via SSO).
63
+
1.DBAs configure Bytebase to connect to your Amazon Aurora MySQL database (Bytebase also supports other RDS engines).
62
64
1. Developer requests Just-in-Time (JIT) table-level access with an expiration time directly through Bytebase.
65
+
1. DBAs review the request and approve it.
66
+
1. Developer can query data via Bytebase SQL Editor.
67
+
1. The developer's actions are tracked in Bytebase audit log.
63
68
64
69
## Prerequisites
65
70
@@ -153,6 +158,8 @@ While creating Aurora MySQL instance, you need to enable AWS IAM authentication.
153
158
154
159
### Admin assigns developer access to the database (Community and Pro Plan)
To elaborate on custom approval, take a look at the following diagram. By defining a custom approval flow along with risk policy, Bytebase will automatically trigger the approval flow when the corresponding risk level is met. In our case, we define a high risk policy for `Request Querier Role` which triggers when the environment is `Prod`.
@@ -207,6 +220,8 @@ In Bytebase **Enterprise Plan**, you can request a JIT access to the production
207
220
208
221
1. After the `dev` user get the access, he can solve the incident. The admin user can revoke the access directly from the **Manage** > **Members** page or wait for the access expiration.
209
222
223
+
1.`admin` user can also check the audit log by clicking **IAM&Admin** > **Audit Log** on the left sidebar. The audit log will show all the data access history of the `dev` user.
224
+
210
225
## Conclusion
211
226
212
227
In this walkthrough, we explored both the benefits and limitations of using AWS IAM authentication, and demonstrated how Bytebase can complement AWS IAM Auth.
0 commit comments