Proxy Management
Overview
QueryPie supports proxy connections for secure database and system access. It provides access through its own web editor and terminal while also supporting connections using proxy credentials generated by QueryPie. By routing all external client connections through the proxy server, QueryPie ensures that all resource access is controlled and that any connections bypassing the proxy are blocked.
Introduction to QueryPie Proxy
Enhanced Security: The proxy acts as a security intermediary between users and resources, adding an extra layer of protection against unauthorized access and potential security breaches.
Centralized Control and Auditing: The proxy logs and audits all user access to resources, providing a centralized auditing function that is essential for compliance and ensuring accountability and transparency.
Real-Time Monitoring: By monitoring user activities in real-time, the proxy helps identify anomalies and potential threats, effectively mitigating risks.
Blocking Unauthorized Remote Access: The proxy allows secure remote access to databases and systems, eliminating the need for users to access sensitive resources directly and minimizing exposure to external threats.
How QueryPie Proxy Works
Proxy Configuration: Administrators can enable or disable the use of the proxy for specific resources through the QueryPie interface.
User Authentication: Users securely connect through QueryPie’s authentication process. Before connecting to the proxy, the system verifies that the user is authorized.
Access Control: The proxy enforces predefined access permissions, ensuring that users can only connect to databases and systems for which they have access rights.
Privacy Protection: Even when using the proxy, data access and masking policies are applied, protecting sensitive data from users who do not have explicit access rights.
QueryPie’s proxy functionality redefines database access and security, offering a robust protection layer that safeguards data, strengthens access control, and minimizes vulnerabilities. By restricting user access to resources and enforcing security policies, the proxy helps organizations maintain privacy and compliance standards.