You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, database connections are established using Host Details & credentials. I propose enhancing this functionality by adding support for AWS RDS IAM authentication. This would enable the use of IAM roles to manage access to RDS databases, improving security and eliminating the need for hardcoded credentials.
Proposed Feature
Implement a configuration option to enable RDS IAM authentication. Modify the database connection logic to generate and use IAM authentication tokens when this option is enabled. For implementation, consider leveraging AWS SDKs to generate RDS authentication tokens. Documentation on RDS IAM authentication can be found here.
Benefits
Enhanced security: IAM roles reduce the risk associated with managing and exposing static credentials.
Simplified credential management: Developers and operators can use AWS's IAM system instead of manually rotating credentials.
Additional context
I know this feature is specifically aiming to solve an issue for AWS customers only. I think it is warranted to support it in this tool because of the widespread use of AWS.
The text was updated successfully, but these errors were encountered:
teenwolf99
changed the title
RDS IAM Authentication
[Feature Request] : RDS IAM Authentication
Jan 13, 2025
@vjmax I'l just getting back to working on Warpgate after doing a lot of major changes in russh (its SSH backend library) - so the frequency of updates should pick up soon. However this specific feature is not a very high priority compared to others since it's still a narrow use case (both Warpgate and MySQL in AWS)
If your company uses Warpgate commercially and you'd like to fast track this feature, I offer both commercial support and feature development - if you're interested, feel free to reach out to me at [email protected]
Description
Currently, database connections are established using Host Details & credentials. I propose enhancing this functionality by adding support for AWS RDS IAM authentication. This would enable the use of IAM roles to manage access to RDS databases, improving security and eliminating the need for hardcoded credentials.
Proposed Feature
Implement a configuration option to enable RDS IAM authentication. Modify the database connection logic to generate and use IAM authentication tokens when this option is enabled. For implementation, consider leveraging AWS SDKs to generate RDS authentication tokens. Documentation on RDS IAM authentication can be found here.
Benefits
Enhanced security: IAM roles reduce the risk associated with managing and exposing static credentials.
Simplified credential management: Developers and operators can use AWS's IAM system instead of manually rotating credentials.
Additional context
I know this feature is specifically aiming to solve an issue for AWS customers only. I think it is warranted to support it in this tool because of the widespread use of AWS.
The text was updated successfully, but these errors were encountered: