Identity and Access for Servers and Databases with StrongDM

Identity and Access for Servers and Databases with #StrongDM

Distribution of assets and information has its challenges. When you have multiple credentials, databases to manage, SSH keys, and other mission-critical components of your cloud ecosystem (or ecosystems) scattered across multiple users, clusters, and devices, simple tasks such as checking an audit log for a point of failure can turn into a nightmare.

Unfortunately, this is the reality many cloud administrators and developers face. StrongDM, a solution developed to tackle this challenge, understands the pain points perfectly. Right out of the box, you can start using strongDM to untangle multiple credentials and sensitive information seamlessly, including to manage and audit access to your databases.

A Set of Tools

Before we can look at how you can use strongDM to manage database access and logs, it is necessary to take a closer look at the solution itself. StrongDM isn’t just a single tool; it is actually a combination of tools that work well together, so you can manage your keys and strings without changing the way you work.

StrongDM, as you may have guessed, sits as a control plane in your cloud cluster. It can handle anything from becoming a log repository to managing authentication APIs and integrating proxies. In essence, strongDM handles onboarding, offboarding, rotation, and audits in one simple sweep. This is a tool that you have to try to appreciate it’s functionality.

What’s interesting is the long list of supported databases. While strongDM isn’t specifically designed to handle database access management, its support for Amazon ES, Mongo DB, MySQL, and Sybase is a promising sign of how strongDM can be used for database management, at least in terms of access and security.

On top of that, strongDM integrates well with a lot of SSO and credential stores. You can, for example, integrate strongDM with Active Directory Federated Services (ADFS) by simply configuring the application properties of the server and adding a client ID. Integration with G-Suite is just as easy with API access enabled and strongDM added as a client.

As mentioned before, it is more of a series of tools rather than a single add-on. With strongDM, you get an authentication API, which—as the name suggests—handles authentication and permissions.

Breaking Boundaries

One of the reasons why strongDM is quickly becoming very popular among developers and server administrators alike is its ability to work with multiple platforms, databases, SSOs, and more. Using strongDM to handle IAM management for databases means gaining the ability to be flexible with user access.

Rather than relying on a centralized pool of credentials—in an attempt to reduce the hassle of using distributed systems—you can actually leverage distribution and still keep things simple. Multiple databases can share the same set of users and encryption keys. Security and ease of use becomes a focus from the beginning.

StrongDM is also designed to boost reliability. It is resilient and can work under the most challenging situation. The fact that it scales horizontally makes this tool more appealing.

You also get a proxy that routes database connections to maintain performance. The protocol-aware proxy comes equipped with load balancing capabilities, failovers, and advanced logging. The former two further enhance availability and reliability.

Logging, however, is definitely a strong suit. StrongDM handles logging in a very meticulous way. It logs every database query and activity, especially activities related to permission change. The advanced logging allows for server and network admins to identify potential issues early. The same detailed logging is handy for when audits are needed.

Understanding the Benefits of StrongDM

As a tool for managing credentials and other sensitive information, strongDM is robust and accessible. It is designed to work as a control plane, so integrating strongDM with existing cloud clusters or ecosystems is easy.

The presence of a proxy means you gain an immediate performance boost. The proxy also acts as a middleman, giving users access to databases even when the network is down. Deployment in almost every cloud platform is easy as well.

For instance, you can use a CloudFormation template to deploy strongDM on AWS. After adding parameters like PublicSubnet and VPC, a strongDM instance can be up and running within minutes. Naturally, the same CloudFormation template can be customized or reused.

Automation of keys and credentials management is the biggest benefit of them all. What strongDM does is consolidate distributed information, but in a secure, consistent, and pleasant way. As an added bonus, strongDM can be deployed in the cloud or on-premise.

It is easy to see why more developers are now fans of strongDM. The seamless integration with SSH, RDP, and Kubernetes, support for multi-factor authentication, and native support for relays and gateways make this control plane indispensable. It even works with Amazon Fargate, with both the network load balancer and the strongDM load balancer optimizing how network resources are used. Still think managing databases and credentials is cumbersome and difficult?

Don’t miss our recent article here, The Pros and Cons of Running Production Databases as Containers


Caylent provides a critical DevOps-as-a-Service function to high growth companies looking for expert support with Kubernetes, cloud security, cloud infrastructure, and CI/CD pipelines. Our managed and consulting services are a more cost-effective option than hiring in-house, and we scale as your team and company grow. Check out some of the use cases, learn how we work with clients, and read more about our DevOps-as-a-Service offering.

Share this article

Leave a comment

Related

Share this article

Newsletter

Join Thousands of DevOps & Cloud Professionals. Sign up for our newsletter for updated information, insight and promotion.