Need Help? We are right here!
Thanks for your Enquiry.
If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com
Search Results:
×Database Policies in miniOrange PAM help administrators control and manage access to database resources securely. These policies allow enforcement of session timeouts, MFA, activity recording, and access permissions to enhance security and compliance.
This guide walks you through the steps to configure database policies, set security controls, and define access management rules.
Database Policy: | A security rule set that governs access and actions on database applications. |
Session Timeout: | The duration before an idle session is automatically terminated. |
Audit Events: | Tracks all executed commands and actions for auditing purposes. |
Recorded Sessions: | Logs user activity for later review. |
Live Stream: | Enables real-time monitoring of user actions. |
Enforce MFA: | Requires multi-factor authentication for added security. |
Transaction Control: | Determines whether commands are executed in a transactional manner. |
Follow these steps to add and manage database policies effectively.
To add a setup new Database Policy:
Determines whether database commands should be executed as part of a transaction.
Defines user access levels to database applications. The available options include:
Specifies how commands are handled when no matching policy is found. The available options include:
Configure allowed (whitelist) or restricted (blacklist) database commands.
📝Note: Command Entry: Enter commands in the text box, separated by a colon (:).
Once all settings are configured, click Add to save the policy.
Once database policies are added, they appear in the Database Policy table with the following details:
Yes, navigate to Database Policy, locate the policy, and modify settings.
Deleting a policy removes all associated security configurations.
If a session remains idle beyond the specified duration, it is automatically terminated.
Whitelisting allows only specific commands, while blacklisting blocks them.
Yes, both can be enabled for enhanced monitoring.