Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Credentials are stored in a secure database table. 
  • Calls through the SSH tunnel happen with each API request to the platform. When the call has been satisfied, the connection is closed. 
    • For asynchronous calls to the database, the connection is not left open during the asynchronous execution of the request.

Limitations

Info

NOTE: This feature can be enabled by request. For more information, please contact

D s support
.


  • This feature is not available for some connections.  

  • SSH key-pair must be generated in the legacy OpenSSH format. The new OpenSSH format is not supported. Instructions for generating the legacy format are provided below.

...

  • You must have credentials to access the SSH tunneling for each connection type. 
  • On each database server to which you using SSH tunneling to connect:
    • You must whitelist
    the 
    • the SSH host, so that the database server will receive connections from it. 
    • For additional security, you can limit access on the SSH host to only the IP address range for
      D s item
      itemService
     on your database server.
    • , which prevents access to the database server through the SSH host for any system other than 
      D s product
      .
    • For more information, see Whitelist Platform Service.

Configure

You can enable the SSH tunneling check box and configure the advanced optionsWhen SSH tunneling is available for your connection type, the following options can be configured to enable it

Info

NOTE: SSH tunneling is enabled on a per-connection basis. If enabled for a connection type, the SSH options appear under the Advanced options in the connection window.

...

For more information, see Create Connection Window.

Basic Properties

PropertyDescription
SSH tunneling host

If you are using SSH tunneling, please specify the SSH host for tunneling into your infrastructure.

Advanced Credential TypeDepending on the type, you must specify the properties for the credentials to use to connection. See sections below.

SSH Tunneling Basic

PropertyDescription
SSH Tunneling User Name

(optional) Username with which to authenticate to the SSH tunnel.

In some environments, a username may be optional.

SSH Tunneling PasswordPassword for the username

SSH Tunneling with Key

Info

NOTE: Use of an SSH key that requires a passphrase is not supported.


PropertyDescription
SSH Tunneling User Name

(optional) Username with which to authenticate to the SSH tunnel.

In some environments, a username may be optional.

SSH Tunneling SSH Key

Key used to access the SSH tunnel.

Info

NOTE: This key must be generated in legacy OpenSSH format. See below.


Generate SSH key

Please use the following command to generate an SSH key from the node where the database server node:

Code Block
ssh-keygen -t rsa -m PEM

...

When a connection is shared with credentials, the SSH authentication credentials are also shared. For more information, see Share a Connection. D s alsolabelssh