What is the difference between Proxy and Reverse Proxy? | How To Use Reverse Proxy for Access Management Control
In this post, we’ll dissect the two concepts and explain how administrators can use a reverse proxy for easy access management control.
Integrate Active Directory With Any Database or Single Sign-On
Consider this when you choose to integrate Active Directory (AD) with your databases and applications using their native APIs, connectors, or toolkits.
How to: MySQL Create User and Manage Access Privileges
Find an easier way to manage access privileges and user credentials in MySQL databases. Reduce manual, repetitive efforts for provisioning and managing MySQL access and security with strongDM.
How to Change the MySQL root Password
On an unmodified MySQL install, the root user account does not have a password. This is extremely insecure! As a systems administrator, we know that the easiest way to compromise a system is using the default unchanged password with admin privileges.
Managing Access to Ephemeral Infrastructure At Scale
Managing a static fleet of strongDM servers is dead simple. You create the server in the strongDM console, place the public key file on the box, and it’s done! This scales really well for small deployments, but as your fleet grows, the burden of manual tasks grows with it.
How to Configure Bastion Host for SSH Logging | Part 3 - Tutorial
Configure the hosts for logging verbose data, and then send the logs to a cloud provider for long-term storage and access.
Create a User in MongoDB and Manage Them Securely
Abstract-away usernames and passwords and allow the systems administrator to keep the master passwords safe under lock & key.
SSH Audit Made Simple
SSH audit logs allow you to determine, either retroactively or in real-time, when an unauthorized or destructive action was taken, and by whom.
A Practical Approach to Just-in-Time (JIT) Access for Developers
Should application developers have access to production database systems? This is a question as old as Vampires and Werewolves.
AWS Console Alternative, Secure AWS Management
Gone are the days of sharing AWS root account credentials in a shared 1Password vault or worse, via email. With this in mind, one of the first steps to securing our AWS account is setting up AWS IAM.
3 ways to Implement Role-Based Access Controls for Kubernetes
Managing RBAC in a way that’s suitable to the size of your company is confusing and overwhelming. Before speeding to implementing policy, it’s worth figuring out what problems RBAC is actually trying to solve.
Connecting Postgres to Active Directory for Authentication
While primarily geared towards developers, PostgreSQL is also designed to help system administrators safely and robustly store information in databases. In this post, we will demonstrate how to install a PostgreSQL database and then configure Active Directory users to authenticate to it.
Connect your first server or database in 5 minutes. No kidding.
"When strongDM said deployment would take an hour, I assumed they were full of it and blocked out a full day. We finished in 45 minutes." - Peter Tormey, Manager DataOps, SoFi