AWS RDS MySQL
In this article
Amazon RDS for MySQL is an open-source relational database management service in the cloud. Through AWS RDS MySQL integration, you will be able to integrate with AWS RDS MySQL:
Database
Table
Role
Prerequisites
If you already have AWS Apono connector:
Make sure the connector's minimum version is 1.5.3.
If you still don't have AWS Apono connector:
Create AWS RDS MySQL Integration
Generate Credentials
Create user and grant permissions:
You can use only one authentication option on the RDS instance at a time.
(MySQL 8.0+) Grant the service account the authority to manage other roles. This enables Apono to create, alter, and drop roles. However, this role does not inherently grant specific database access permissions.
Create Integration in Apono
In the Apono admin console, go to the Integrations page and click the Add Integration button in the top-left side, or press on the Catalog blade.
In the Catalog page search for and select AWS RDS MySQL.
In Discovery step, select one or multiple AWS RDS MySQL resource types for Apono to discover.
In Apono connector step, select the connector with the required permissions to be used with your AWS RDS MySQL.
In Integration config step, provide the following information about your AWS RDS MySQL:
Variable | Value | Required |
---|---|---|
Integration Name | The integration name. | Yes |
Auth Type | The authentication method for connecting to an AWS RDS instance, with options for password (username and password) or iam (IAM-based authentication). | Yes |
Region | AWS region where the RDS instance is located. | Yes |
Instance ID | The unique identifier of the AWS RDS instance. | Yes |
Credentials rotation period (in days) | i.e.: 90 | No |
User cleanup after access is revoked (in days) | i.e.: 90 | No |
In Secret Store step, provide the connector credentials using one of the following secret store options:
When using IAM authentication, **a secret does not need to be created**. The service account and its permissions are managed through IAM roles and policies. The service account is used to authenticate the MySQL instance instead of a secret.
For the AWS RDS MySQL integration, use the following secret format:
username:<The database username>
password:<The user password>
\
(Optional) In Get more with Apono step, you can set up the following:
Setting | Description |
---|---|
Custom Access Details | Customize the access details message that will be displayed to end users when they access this integration. |
Integration Owner | Apono can use the integration owner for access requests approval if no owner is found. Enter one or more users, groups, shifts or attributes. This field is mandatory when using Resource Owners and serves as a fallback approver if no resource owner is found. |
Resource Owner | Apono will sync each resource's owner from the source integration. Use this for Resource Owner access requests approval. Enter the tag key that contains owners info, and map it to an attribute in Apono. |
Next Steps
Last updated