MongoDB Insecurity Levels and How to Avoid Them
Most database management systems have several techniques of securing their data from an outsider or an unauthorized person or application. The techniques prevent your data from being read or copied without the user’s permission. MongoDB...
One Security System for Application, Connection Pooling and PostgreSQL – The Case for LDAP
Traditionally, the typical application consists of the following components: In this simple case, a basic setup would suffice: the application uses a simple local authentication mechanism for its users the application uses a simple connection...
Integrating PostgreSQL With Authentication Systems
PostgreSQL is one of the most secure databases in the world. Database security plays an imperative role in the real-world mission critical environments. It is important to ensure databases and the data is always secured...
How to Setup Centralized Authentication of ClusterControl Users with LDAP
ClusterControl 1.2.6 introduces integration with Active Directory and LDAP authentication. This allows users to log into ClusterControl by using their corporate credentials instead of a separate password. LDAP groups can be mapped onto ClusterControl user...