Authorizing Definite's IP Address
Guide to authorize / whitelist Definite’s IP Address for your database
Definite IP Address
First things first, if your database has IP address / networking security, you’ll need to whitelist our IP address:
Here’s how to do this on various cloud platforms
Amazon Web Services (AWS) Security Groups
Log in to the AWS Management Console and open the Amazon RDS console at https://console.aws.amazon.com/rds/.
In the navigation pane, choose Security groups
.
Choose the Security Group associated with your database.
In the details pane, choose the Inbound
tab, then choose Edit
.
Choose Add Rule
.
In the Type dropdown, select the protocol you want to permit.
In the Source section, enter our IP address in the format: '146.148.83.61/32'
.
Choose Save
.
Google Cloud Platform (GCP) Firewall Rules
Open the Google Cloud Console at https://console.cloud.google.com/.
Select your project.
In the left sidebar, click on VPC network
, then click Firewall
.
Click Create Firewall Rule
.
Enter a name for the firewall rule.
Under Target tags, enter the network tag associated with your instance.
Under Source filter, choose IP ranges
.
In the Source IP ranges field, enter our IP address (146.148.83.61).
Under Protocols and ports, select the protocol and ports used by your SQL database.
Click Create
.
Microsoft Azure SQL Database Server-Level Firewall Rules
Log in to the Azure portal at https://portal.azure.com/.
In the left-hand menu, select SQL databases
.
In the SQL databases pane, choose your database.
In the toolbar at the top, click Set server firewall
.
At the top of the firewall settings page, click + Add client IP
.
Enter our IP address in the Start IP and End IP fields.
Click Save
.
Snowflake Network Policies
Log in to the Snowflake web interface.
On the top menu, click on Account
>> Policies
.
Click on Create
.
Enter a name for the network policy.
In the Allowed IP Addresses field, enter our IP address.
Leave the Blocked IP Addresses field empty.
(Optional) Check the Enforce MFA box for multi-factor authentication.
Click Finish
.
Assign the network policy to the necessary users or roles.
Google Cloud BigQuery
BigQuery leverages GCP’s security model, and thus it doesn’t offer native IP whitelisting like a traditional database. Instead, it relies on Google Cloud’s Identity and Access Management (IAM) system, OAuth, and other security protocols.
If your BigQuery data is connected to a Compute Engine instance, you can use GCP’s firewall rules:
Open the Google Cloud Console at https://console.cloud.google.com/.
Select your project.
In the left sidebar, click on VPC network
, then click Firewall
.
Click Create Firewall Rule
.
Enter a name for the firewall rule.
Under Target tags, enter the network tag associated with your instance.
Under Source filter, choose IP ranges
.
In the Source IP ranges field, enter our IP address.
Under Protocols and ports, select the protocol and ports used by your Compute Engine instance.
Click Create
.
Always remember to only whitelist trusted IP addresses and maintain your security settings updated. Regularly reviewing and updating these settings will help protect your resources from unauthorized access.