- Reduce Over Privileges - Discover existing privileges to RDS MySQL databases and convert them to on-demand access flows to reduce over-privileges.
- Self Service Access - Empower your developers to gain self-servable access to databases using Slack.
- Automated Approval Workflows - Create approval workflows to specific sensitive databases.
- Restricted Third Party Access - Grant third-party (customer or vendor) time-based access to specific databases with MFA verification.
- Review Access - View a detailed access audit of who was granted access to which databases with what permission level and why.
- Permission to view Secret Manager details.
Apono does not store credentials, therefore these permissions are required to be able to connect using the AWS Secret Manager
Have you connected an AWS account?
Make sure you have first integrated your AWS account to Apono. If not, follow this AWS Integration step-by-step guide.
- Click on Integrations Catalog.
- Under Data Sources, look for MySQL and click Connect
- Specify the integrations details:
- Integration name – type the name of the integration
When building an Access Flow you will reference this name
- Select the Connector – specify the AWS account Connector name with access to this MySQL
- Hostname – specify the hostname of the MySQL you are connecting
Identify the secret
- Region – Choose the region where the secret resides
- Secret ID – Choose the secret ID that is used to access this RDS PostgreSQL with admin privileges. If you don't have one you can create one.
To find the secret ID go to your AWS account -> RDS -> DB Instances -> PostgreSQL identifier. Click on the Tags tab, copy the secret value, and paste it to the Secret ID on the PostgreSQL integration page.
If you would like to create a secret, see this guide
- Click Connect
Congratulations on connecting you RDS MySQL. You can now create Access Flows that grant permissions to your RDS MySQL databases.
Updated 10 days ago