![]() Set the connection properties and start working with remote MySQL data from your local system, all through a secure SSH tunnel.įor more information and to download a free trial, visit the MySQL Driver page. ![]() User=myUser Password=myPassword Database=NorthWind Server=myServer Port=3306 UseSSH=TRUE SSHClientCert="/home/ssh.pem" SSHClientCertSubject=* SSHClientCertType=PEMKEY_FILE SSHClientCertPassword="" SSHUser=root SSHPassword="" SSHServer=123.456.789.012 SSHServerFingerprint="" SSHPort=1022īecause the SSH client is built directly into the connectors, the setup and usage is exactly the same, regardless of the operating system. SSH Port: The port of the SSH server (default: 22).īelow, you can see an example of a configured SSH client in our ODBC Driver, but the connection is just as easily configured in any of our connectors.ĭepending on the connector, you may need to configure a connection string, similar to the following: Sample Connection String.SSH Server Fingerprint: The fingerprint of the SSH server.SSH Server: The location of the SSH server.SSH Password: The password for the SSH user.SSH User: The username for the SSH server.SSH Client Cert Password: The password for the SSH client certificate (if required).SSH Client Cert Type: The type of key store containing the SSH client certificate.SSH Client Cert Subject: The subject used to search for the certificate in the specified store (default "*").SSH Client Cert: The name of the certificate store, path to the client certificate file, or the contents of the client certificate.In order to connect, you will need to set Use SSH to "true" and set the following properties: The CData Connectors for MySQL contain a built-in SSH client that allows you to easily connect to a MySQL instance through an SSH tunnel.Įach CData MySQL connector has connection properties that allow you to connect to a MySQL instance through an SSH server. Generally, creating an SSH tunnel requires a separate SSH client. ![]() With an SSH tunnel you do not have to configure your MySQL server to accept remote connections, which means that your MySQL instance has fewer security risks. SSH uses strong encryption and, through the tunnel, makes it look like the client connections are coming from the SSH server (and not from a remote client). Using an SSH tunnel requires an SSH server to be running in the same environment as the MySQL instance, but once the server is running, setting up a tunnel is a straight-forward process. SSH Tunnel MySQL can be configured to only accept traffic from 'localhost', blocking all connections except ![]() To supporting encryption through SSH security protocols, which have a terrific record against attacks, with an While the CData MySQL driver supports both options, with ourīuilt-in support for tunneling, SSH Tunneling is typically easier to implement and more secure. When you want to expose access to your MySQL database through an insecure network, there are two main choices:Īn SSL connection or through an SSH tunnel. ![]()
0 Comments
Leave a Reply. |