What is Zero-Trust Access Control?
Zero Trust means what it says: you don’t trust anyone, you don’t hand out database logins and you don’t just allow users into your network.
With Cirro, you’ve got granular control over every part of your database infrastructure. Everything is verified and recorded, from who is able to login, when and how they can login, the databases being accessed and the queries being run.
Setup Access Control
Step One: Authentication and Roles
Roles make the management of database credentials and privileges much easier than if you granted them to each user in turn.
Start with a keychain role to grant direct database privileges.
Then grant Cirro and direct database privileges.
Learn more about Data Control
Step Two: Onboard Users
Choose whether to add users to Cirro Directory, or integrate LDAP or Azure AD.
Add Cirro Managed Users
Cirro has its own directory service where you can add and manage users. It's a good choice for small teams or specific users like administrators.
During the process, you can add built-in or custom roles, database credentials, table privileges and Cirro privileges.
Manage your users in the View All Users page.
View privileges granted to users
View database credentials granted to roles
Step Three: Define Access Rules
Access Rules define who can login, how they can login, when and how, and what they can access.
Access rules provide application-level security to the Cirro server. They can restrict access to Users, Databases and IP or network addresses either permanently or at specified times.
Learn more about Access Rules and Alert Actions