<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon
blog /
Managing Access to Ephemeral Infrastructure At Scale

Managing Access to Ephemeral Infrastructure At Scale

Managing a static fleet of strongDM servers is dead simple. You create the server in the strongDM console, place the public key file on the box, and it’s done! This scales really well for small deployments, but as your fleet grows, the burden of manual tasks grows with it.
There and Back Again: GraphQL at StrongDM

There and Back Again: GraphQL at StrongDM

Our incredible journey from bespoke REST endpoints to GraphQL.
Scaling Your SSH Strategy

Scaling Your SSH Strategy

In our last post, we discussed some of the challenges that are inherent to management of SSH keys across your infrastructure as you scale the number of team members and servers. In this post, we will dig into some of your options and the trade-offs that they provide.
Forward Proxy vs. Reverse Proxy: The Difference Explained

Forward Proxy vs. Reverse Proxy: The Difference Explained

In this post, we’ll dissect the two concepts and explain how administrators can use a reverse proxy for easy access management control.
Integrate Active Directory With Any Database or Single Sign-On

Integrate Active Directory With Any Database or Single Sign-On

Consider this when you choose to integrate Active Directory (AD) with your databases and applications using their native APIs, connectors, or toolkits.
How to Create a MySQL User (Step-by-Step Tutorial)

How to Create a MySQL User (Step-by-Step Tutorial)

Find an easier way to manage access privileges and user credentials in MySQL databases. Reduce manual, repetitive efforts for provisioning and managing MySQL access and security with strongDM.
Change/Reset Default MySQL Root Password (Linux & Windows)

Change/Reset Default MySQL Root Password (Linux & Windows)

On an unmodified MySQL install, the root user account does not have a password. This is extremely insecure! As a systems administrator, we know that the easiest way to compromise a system is using the default unchanged password with admin privileges.
How to Configure Bastion Host for SSH Logging | Part 3 - Tutorial

How to Configure Bastion Host for SSH Logging | Part 3 - Tutorial

Configure the hosts for logging verbose data, and then send the logs to a cloud provider for long-term storage and access.
How to Create a User and Add a Role in MongoDB (Safest Way)

How to Create a User and Add a Role in MongoDB (Safest Way)

Abstract-away usernames and passwords and allow the systems administrator to keep the master passwords safe under lock & key.
SSH Audit Made Simple

SSH Audit Made Simple

SSH audit logs allow you to determine, either retroactively or in real-time, when an unauthorized or destructive action was taken, and by whom.
A Practical Approach to Just-in-Time (JIT) Access for Developers

A Practical Approach to Just-in-Time (JIT) Access for Developers

Should application developers have access to production database systems? This is a question as old as Vampires and Werewolves.
AWS Console Alternative, Secure AWS Management

AWS Console Alternative, Secure AWS Management

Gone are the days of sharing AWS root account credentials in a shared 1Password vault or worse, via email. With this in mind, one of the first steps to securing our AWS account is setting up AWS IAM.
3 Costly Cloud Infrastructure Misconfigurations

3 Costly Cloud Infrastructure Misconfigurations

It has never been easier for your company to build new infrastructure. In just a few clicks, you can spin up shiny new servers and databases in the cloud and start using them in seconds. However, in the rush to deploy new services so quickly, companies often let information security be an ...
Connecting Postgres to Active Directory for Authentication

Connecting Postgres to Active Directory for Authentication

While primarily geared towards developers, PostgreSQL is also designed to help system administrators safely and robustly store information in databases. In this post, we will demonstrate how to install a PostgreSQL database and then configure Active Directory users to authenticate to it.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀