All Products
Search
Document Center

Data Management:Apply for the permissions to access a database instance by using proxy endpoints

Last Updated:Nov 14, 2024

To access a database instance for which the secure access proxy feature is enabled, you can submit a ticket to apply for necessary permissions. After the ticket is approved, you can obtain an AccessKey pair to access the database instance. This topic describes how to apply for the permissions to access a database instance by using proxy endpoints.

Prerequisites

The secure access proxy feature is enabled for the database instance. For more information about how to enable the feature, see Enable the secure access proxy feature.

Procedure

  1. Log on to the DMS console V5.0.
  2. Move the pointer over the 2023-01-28_15-57-17.png icon in the upper-left corner and choose All functions > Security and Specifications > Secure Access Proxy > Proxy List.

    Note

    If you use the DMS console in normal mode, choose Security and Specifications > Secure Access Proxy > Proxy List in the top navigation bar.

  3. On the Created tab, find the database instance that you want to access and click Application in the Permissions column.

    Note

    If you are an authorized user of the database instance, Connection Details is displayed in the Permissions column.

    DMS automatically generates a ticket to apply for the permissions to access the database instance by using proxy endpoints. workapplication

  4. After the ticket is approved, go to the Created tab. Find the instance and click Details in the Operation column. On the Secure Access Proxy/Details page, view your AccessKey ID and AccessKey secret.

Supported operations

You can perform the following operations to manage your AccessKey pair and permissions:

  • Update the AccessKey secret of an authorized user: Click Update to generate a new AccessKey secret. Then, the programs of the authorized user cannot access the database instance by using the previous AccessKey secret.

  • Revoke permissions from an authorized user: If the authorized user no longer needs to access the database instance, click Release. Then, the user can no longer connect to the proxy endpoints of the database instance.

What to do next

After you are authorized to access a database instance by using proxy endpoints, you can access the database instance over the MySQL or HTTPS protocol by using the proxy endpoints generated by the secure access proxy feature.