Authentication
A cornerstone of the Enterprise edition is its ability to integrate with centralized secret managers, eliminating the need for static credentials stored in local or .env files. The server dynamically fetches database credentials and API keys at startup, ensuring a secure and compliant operational posture.
Key Features
Multi-layered Authentication: JWT-based authentication (HS256/RS256) with bcrypt password hashing
Adaptive Architecture: Intelligent tool registration based on service availability
Role-Based Access Control (RBAC): Fine-grained permission management
Multiple Deployment Modes: Standalone, 1Password, Local Vault, and HCP Vault
Database-Enforced User Validation: Shared database ensures only registered users can access services
Authentication Flow
1. User Registration
2. User Login
3. Authenticated Request
Deployment Modes
1. Standalone
Purpose: Simple deployment with direct environment variables
Configuration: Direct environment variables
Key Settings:
When to Use: Development, testing, small deployments, No external secret management available
Startup:
2. 1Password
Purpose: Secure secret management using 1Password CLI
Configuration: op:// secret references
Key Settings:
Prerequisites:
Install 1Password CLI
Authenticate:
op signinCreate vault and items with required secrets
Startup:
When to Use: Team environments, shared secrets, Production
3. Local Vault
Purpose: Development with local HashiCorp Vault
Configuration: Local Vault server
Key Settings:
Setup:
Startup:
When to Use: Development, Production with proper vault setup
4. HCP Vault
Purpose: Production deployment with HashiCorp Cloud Platform Vault
Configuration: HCP Vault cluster
Key Settings:
Setup:
Create HCP Vault cluster
Configure AppRole authentication
Create policies for application access
Store secrets in Vault
Generate role_id and secret_id
Startup:
When to Use: Production, enterprise deployments
This page is: Copyright © 2025 MariaDB. All rights reserved.
Last updated
Was this helpful?

