An Overview of PostgreSQL 13 libpq sslpassword Connection Parameters
PostgreSQL since long has supported SSL connections and also certificate-based authentication mechanisms. Although nothing in this regard seems to be new for the PostgreSQL world. However, a small nagging issue for client connection (client-certificates based...
Announcing ClusterControl 1.8: Manage Hundreds of Databases from a Single Interface
We’re excited to announce the 1.8 release of ClusterControl - the only database management system you’ll ever need to take control of your open source database infrastructure. ClusterControl has always allowed our users to manage...
A Security Checklist for MongoDB Production Deployments
When an application requires a large geographical area to perform an organization is often forced to store its data in the cloud. Applications built on MongoDB are not an exception to this concept. Failure to...
MariaDB Server Database Encryption Basics
Encryption is one of the most important security features to keep your data as secure as possible. Depending on the data that you are handling, not always it is a must but you should at...
Using the MariaDB Audit Plugin for Database Security
There are different ways to keep your data safe. Practices such as controlling database access, securing configuration, upgrading your system, and more are part of database security. It is even possible that you have security...
PostgreSQL Anonymization On Demand
Before, during, and after the GDPR came into town in 2018, there have been many ideas to solve the problem of deleting or hiding user data, using various layers of the software stack but also...
MySQL Workbench Alternatives – ClusterControl Database User Management
MySQL user and privilege management is very critical for authentication, authorization and accounting purposes. Since MySQL 8.0, there are now two types of database user privileges: Static privileges - The common global, schema and administrative...
An Overview of MongoDB User Management
Database User Management is a particularly important part of data security, as we must understand who is accessing the database and set the access rights of each user. If a database does not have a...
Using SSH Tunneling as a VPN Alternative
Using a VPN connection is the most secure way to access a network if you are working remotely, but as this configuration could require hardware, time, and knowledge, you should probably want to know alternatives...
My DBA is Sick – Database User Management Tips for SysAdmins
User management is one of the day-to-day tasks that are performed by database administrators. If your database administrator is not available and you have been appointed to perform his tasks, you may have been asked...
My DBA is Sick – Database Security Tips for SysAdmins
The day happened when your database administrator did not show up on the daily online standup. Shortly after you have learned that he’ll be unavailable for an unknown period of time and it is you,...
An Overview of Client-Side Field Level Encryption in MongoDB
Data often requires high end security on nearly every level of the data transaction so as to meet security policies, compliance, and government regulations. Organization reputation may be wrecked if there is unauthorized access to...