You finally got Redash talking to your production database, but the security team now wants it locked behind an identity-aware gate. The admin asks if you’ve “tried the TCP proxy mode,” and suddenly it’s your problem. This is where Redash TCP Proxies earn their place. They bridge the gap between visibility and control, making analytics possible without blowing a hole in your network policy.
Redash already excels at turning SQL into dashboards and alerts. A TCP proxy sits underneath that, handling encrypted tunnels so Redash can reach private data sources without exposing credentials or skipping firewalls. The proxy becomes your traffic handler: connecting sessions, authenticating users, and enforcing policies from providers like Okta or AWS IAM. It replaces guesswork with traceable logic.
The workflow is simple in theory. You run the Redash TCP Proxy near the data source or inside your restricted subnet. Redash connects through it instead of directly to the database. Authentication happens through standard identity systems, often OIDC flows, and RBAC determines who can query what. Every connection is short-lived and observable, which matters when SOC 2 auditors come knocking. You get consistent, policy-bound routes instead of static VPN tunnels that live forever.
When configuring, keep the rules explicit. Map identity groups to source permissions, rotate proxy secrets on schedule, and inspect connection logs regularly. If latency spikes or queries fail, check certificate mismatches first, then the proxy ACLs. Most issues trace to expired tokens or missing group claims. Treat it as infrastructure, not a one-time setup.
Featured answer: A Redash TCP Proxy is a secure relay that connects Redash to internal databases through identity-aware tunnels, allowing access control and audit without exposing direct network paths.