Add SAML/OIDC Single Sign-On to MySQL and MariaDB database connections. Replace shared database passwords with identity-based access. Full query audit trail with individual accountability.
Why MySQL Needs Identity-Based Database Access
MySQL and MariaDB power the majority of web applications worldwide — from WordPress and Magento to custom enterprise applications. Database access typically relies on shared credentials embedded in application configuration files, .my.cnf files, and environment variables. OnePAM's database proxy adds SAML/OIDC authentication to MySQL and MariaDB without changing database configuration. The proxy speaks native MySQL wire protocol, works with any MySQL client (mysql CLI, MySQL Workbench, DBeaver, HeidiSQL), and provides identity-verified query logging for compliance. Credentials are stored in OnePAM's encrypted vault and injected at session time — developers never handle database passwords directly. The proxy supports MySQL 5.7+, MySQL 8.x, MariaDB 10.x, and all major managed services including AWS RDS, Azure Database for MySQL, GCP Cloud SQL, and PlanetScale.
MySQL Access Security Risks
Without identity-based database access, these risks threaten your data every day.
Database Security Challenges
These are the risks organizations face with traditional database authentication.
Root Password Sharing
MySQL root credentials are shared among DBAs and stored in plaintext configuration files. Password rotation requires updating every application and script that uses the credential.
No Native SAML/OIDC
MySQL's authentication plugins support password, LDAP, and PAM — but not SAML or OIDC. Modern SSO integration requires external proxy infrastructure.
Credential Exposure
MySQL passwords in .my.cnf, environment variables, Docker secrets, and CI/CD pipelines create multiple attack vectors. A single leaked credential compromises the database.
No Individual Accountability
When multiple developers share the same MySQL user, the general query log shows the database user — not the human who ran the query. Forensics becomes guesswork.
Compliance Failures
Shared MySQL credentials fail SOC 2, HIPAA, and PCI DSS requirements for individual access accountability. Auditors flag shared database accounts every time.
Slow Deprovisioning
When an employee leaves, every MySQL credential they had access to must be rotated. Missing even one leaves a backdoor open indefinitely.
How OnePAM Adds SSO to MySQL
Step-by-step guide to deploying identity-based database access.
Connect via OnePAM Proxy
Point your MySQL client to the OnePAM database proxy. The proxy speaks native MySQL wire protocol — works with mysql CLI, MySQL Workbench, DBeaver, and application drivers.
Authenticate via Corporate IdP
OnePAM redirects to your IdP (Okta, Azure AD, Google Workspace) for SAML/OIDC authentication with MFA enforcement.
Credential Injection
After authentication, OnePAM retrieves MySQL credentials from its encrypted vault and establishes the database session. Users never see database passwords.
Identity-Verified Query Logging
Every SQL query is logged with the authenticated user's corporate identity, providing individual accountability for compliance and forensics.
Benefits of SSO for MySQL
What changes when you deploy identity-based database access.
Individual Accountability
Every MySQL query is attributed to a specific corporate identity. No more shared credentials hiding who did what.
100% identity attributionZero Password Exposure
Database passwords stay in the vault. Developers and DBAs never see or handle MySQL credentials directly.
Zero credential exposureAutomatic Rotation
OnePAM rotates MySQL passwords automatically without disrupting applications or users.
Automated rotationMFA Enforcement
Enforce IdP MFA policies on every MySQL connection. No MySQL-specific auth plugin configuration.
MFA on every sessionInstant Deprovisioning
Disable a user in your IdP and MySQL access stops immediately. No password rotation cascade.
Instant revocationCompliance-Ready Logs
Identity-verified query logs satisfy SOC 2, HIPAA, PCI DSS, and SOX requirements out of the box.
Audit-readyDatabase SSO Features
Every feature needed for enterprise-grade database authentication.
Security Features
Enterprise-grade security controls for database access.
MySQL SSO Use Cases
Common scenarios where organizations deploy OnePAM Database SSO.
SSO for MySQL / MariaDB FAQ
Common questions about Database SSO and query-level auditing.
Does OnePAM work with MySQL on AWS RDS and Azure?
Do I need to modify my MySQL server configuration?
Does OnePAM support MariaDB-specific features?
How does OnePAM handle MySQL connection pooling?
Can I enforce read-only access for specific users?
What happens during a failover or replica promotion?
Add SSO to MySQL Access
Deploy OnePAM database proxy in minutes. Works with MySQL, MariaDB, and all managed services.