AWS RDS
The Granted AWS RDS Plugin allows you to broker a connection to an AWS RDS database over AWS SSM Session Manager. The connection is routed through a Common Fate AWS Proxy which runs on AWS Fargate and captures audit logs of the SQL statements executed.
Using AWS SSM Session Manager allows you to access databases within your VPC without needing to manage a VPN or expose your databases to public ingress.
The plugin uses the Common Fate control plane APIs to determine which databases a user is authorized to access, so to use this plugin a Common Fate instance is required. Email us at hello@commonfate.io if you’d like to test this and we’ll set up an instance for you.
Requirements
To use this plugin, you’ll need a Common Fate instance with the AWS RDS integration configured.
You’ll also need to be running Granted v0.31 or later. You can check your Granted version by running granted -v
.
To use the plugin, run:
You should see a selector showing the databases that you are permitted to request access to:
Select a database with the up and down arrows, and press Enter. You should see an output like the below:
Depending on the authorization policies your Common Fate administrators have configured, access may be automatically approved to the database, or may require a manual approval.
Once access is approved, you can re-run granted rds proxy
to begin brokering a connection. You should see an output similar to the below:
Under the hood, Granted opens an AWS SSM Session Manager session to the Common Fate AWS Proxy service. The AWS Proxy service intercepts and logs the SQL statements you are running, and forwards the commands to the database.