
- Resource Selection
- Credentials Configuration
- Review and Create
Resource Selection
When creating a new connection, you’ll first choose from three main resource types:Database
For databases like MySQL, PostgreSQL, MongoDB and more.
Linux VM, Container or Console
For Linux servers, Docker, Kubernetes or other applications.
Network service access (ZTNA)
For internal network resources.
Credentials Configuration

Database Connections
Database Connections
First, select your database type:
- Microsoft SQL
- MongoDB
- MySQL
- Oracle DB
- PostgreSQL
- Host address (e.g. localhost)
- Port number (e.g. 3306)
- Username
- Password
- Database name
- SSL mode (Optional)
- Agent selection
Linux VM, Container or Console
Linux VM, Container or Console
Choose your connection subtype:
Linux VM or Container
- Access and manage with terminal commands
Secure Shell Protocol (SSH)
- Private Key (paste your file content)
- SSH URI (ssh://[uri])
- Agent selection
Console
Select your application type:- Ruby on Rails
- Python
- Node.js
- Clojure
- Operating system (MacOS/Linux)
- Environment variables (Key-Value pairs)
- Configuration files
- Name (e.g. kub_config)
- Content
- Additional command (optional)
- Agent selection
Network Service Access (ZTNA)
Network Service Access (ZTNA)
First, select your network access type:
- TCP
- HTTP (Coming Soon)
- Host address (e.g. localhost)
- Port number
- Agent selection
Agents provide secure interaction with your connection. Learn more about Agents.
Review and Create

- Set a connection name
- Add optional tags for organization
- Configure additional security features:
- Reviews - Require approval prior to connection execution
- AI Data Masking - Automatically mask sensitive data in query results
Security Best Practices
Meaningful Names
Use descriptive names that indicate the purpose and environment of the connection.
Tag Organization
Utilize tags to categorize and manage connections effectively.
Enable Reviews
Set up reviews for sensitive connections to maintain security.
Data Protection
Enable AI Data Masking when handling sensitive information.