SAML/OIDC Authentication for Databases

SSO for Database Access on Any Engine

Replace shared database credentials with SAML/OIDC Single Sign-On. Authenticate database sessions via your corporate IdP (Okta, Azure AD, Google Workspace). Deploy via OnePAM database access for PostgreSQL, MySQL, SQL Server, MongoDB, Elasticsearch, CockroachDB, Snowflake, Cassandra, and Neo4j — every query is identity-verified and audited.

OnePAM Database Proxy Architecture

OnePAM sits between your users and databases as an identity-aware proxy. Every connection is authenticated via your corporate IdP before any query reaches the database.

1

Connect via Proxy

Users connect through OnePAM's browser console or CLI client instead of connecting directly to the database.

2

IdP Authentication

OnePAM redirects the user to your corporate Identity Provider for SAML/OIDC authentication. MFA is enforced per your IdP policies — Duo, FIDO2, push notifications.

3

Credential Injection

After successful authentication, OnePAM retrieves database credentials from the vault and injects them into the connection. Users never see or handle database passwords.

4

Query Audit Logging

All queries are logged with full identity context — who ran what, when, and from where. Complete audit trail tied to corporate identity, not shared database accounts.

Shared Database Credentials Are a Security Liability

Most organizations share database passwords across teams. When everyone uses the same credentials, you lose visibility, accountability, and control over your most critical data.

Shared Database Passwords

Teams share a single database password via Slack, wikis, or env files. Anyone with the password has full access — no way to know who ran which query.

No Individual Accountability

When 20 developers share the same "app_user" credentials, database logs show the same user for every query. Forensic investigation is impossible.

Credential Sprawl

Database passwords end up in .env files, CI/CD configs, Docker Compose files, developer laptops, and Slack messages. Attack surface grows with every copy.

Compliance Gaps

SOC 2, HIPAA, PCI DSS, and GDPR require individual access controls and audit trails. Shared credentials fail every compliance audit.

No Query Auditing

Without identity-aware access, you cannot audit which human ran a destructive DELETE or exported sensitive data. Native database logs lack identity context.

Insider Threats

Disgruntled employees or compromised accounts can exfiltrate data using shared credentials. No MFA, no session controls, no revocation on departure.

How OnePAM Protects Your Databases

Identity-First Access

Every database connection requires a valid corporate identity verified via SAML/OIDC. No anonymous or shared-credential access permitted.

Credential Vaulting

Database passwords are stored in OnePAM's encrypted vault. Users never see credentials — the proxy injects them after identity verification.

Query-Level Audit

Every SQL statement, MongoDB operation, Elasticsearch API call, and Neo4j query is logged with the authenticated user's identity. Full forensic trail for every query.

Automatic Rotation

OnePAM automatically rotates database credentials on schedule. No human intervention needed — credentials are always fresh and never stale.

SSO for Databases — By Engine & Use Case

Click any guide for engine-specific setup instructions, proxy configuration, credential vaulting, and query audit details.

What Changes with Identity-Based Database Access

Replace shared database passwords with corporate identity on every connection. Gain full visibility into who queries what, with automatic credential management.

Eliminate Shared Credentials

No more passing database passwords through Slack or env files. Every user authenticates with their own corporate identity — credentials are vaulted and invisible.

Query-Level Audit Trail

Every SQL query, MongoDB operation, Elasticsearch API call, and Neo4j query is logged with the authenticated user's corporate identity. Know exactly who ran what and when.

MFA on Every Connection

Enforce multi-factor authentication (Duo, FIDO2, push) on every database connection using your IdP's MFA policies. No database-specific MFA configuration needed.

Instant Deprovisioning

Disable a user in your IdP and database access stops immediately across every engine. No password resets, no credential rotation — access is identity-bound.

Credential Auto-Rotation

OnePAM rotates vaulted database credentials automatically on your schedule. No manual password changes, no downtime, no stale credentials in config files.

Compliance-Ready Access

SOC 2, HIPAA, PCI DSS, GDPR — all require individual access controls and audit trails for databases. OnePAM provides identity-verified logs for every query.

OnePAM Database SSO vs. Traditional Database Access

See what changes when you replace shared database passwords with identity-based authentication through OnePAM.

Capability With OnePAM Traditional Database Access
Authentication SAML/OIDC via corporate IdP Shared database passwords
Credential Management Vaulted, auto-rotated, invisible to users Passwords in env files, wikis, Slack
MFA Enforcement IdP MFA (Duo, FIDO2, push) Not supported by most databases
Query Auditing Every query tied to corporate identity Queries logged under shared accounts
User Deprovisioning Instant via IdP disable Manual password reset across all engines
Session Recording Full query session capture with identity No native session recording
Audit Trail Identity-verified, centralized Per-engine logs, no identity context
Compliance (SOC2/HIPAA/PCI) Built-in controls and evidence Manual evidence collection

Add SSO to Database Access on Any Engine

Deploy the OnePAM database proxy. Connect your IdP. Replace shared credentials with identity-based access in minutes.

SSO for Database Access - SAML and OIDC Authentication for Any Database Engine

OnePAM adds SAML 2.0 and OpenID Connect (OIDC) Single Sign-On to database authentication across the engines currently implemented in the product. Supported databases include PostgreSQL, MySQL, Microsoft SQL Server, MongoDB, Elasticsearch, CockroachDB, Snowflake, Cassandra, and Neo4j. OnePAM replaces shared database credentials with identity-based access tied to your corporate Identity Provider (Okta, Azure AD, Google Workspace, OneLogin, Ping Identity).

OnePAM Database Proxy Architecture

OnePAM operates as an identity-aware database access layer. Users connect through OnePAM's browser console or CLI client, OnePAM authenticates the user via SAML/OIDC, retrieves vaulted database credentials, injects them into the session, and logs every query with the authenticated user's corporate identity. Users never see or handle database passwords.

Credential Vaulting and Automatic Rotation

Database credentials are stored in OnePAM's encrypted vault and automatically rotated on a configurable schedule. This eliminates credential sprawl — no more passwords in .env files, CI/CD pipelines, Slack messages, or developer laptops. When OnePAM rotates credentials, connected sessions continue uninterrupted while new connections use the fresh credentials.

Query-Level Audit Trail with Identity Context

Every SQL query, MongoDB operation, Elasticsearch API call, and Neo4j query passing through OnePAM is logged with the authenticated user's corporate identity, timestamp, source IP, and session metadata. This provides a complete forensic audit trail for compliance (SOC 2, HIPAA, PCI DSS, GDPR) and incident investigation, far beyond what native database audit logs provide with shared accounts.

Query restrictions are driver-aware and enforced at the OnePAM access layer. For SQL-family engines, deny and read-only controls remain best-effort heuristic checks rather than parser-backed guarantees, so the database remains the final authority on query semantics.