The SQL Interface supports multiple authentication mechanisms to connect to your MongoDB deployment. This page includes supported authentication methods, component compatibility, and deployment availability for both Atlas and self-managed MongoDB Enterprise deployments.
Authentication Support Matrix
The following table shows which authentication mechanisms are supported by each SQL Interface component:
Componente | SCRAM | X.509 | LDAP | GSSAPI | AWS IAM | OIDC |
|---|---|---|---|---|---|---|
MongoDB SQL Schema Builder | Sí | Sí | Sí | Sí | Sí | Sí |
Controlador ODBC | Sí | Sí | Sí | Sí | Sí | Sí |
Controlador JDBC | Sí | Sí | Sí | Sí | Sí | Sí |
Power BI Desktop | Sí | Sí | Sí | Sí | Sí | Sí |
Power BI Gateway | Sí | No | No | No | No | No |
Tableau Desktop | Sí | Sí | Sí | Sí | Sí | Sí |
Tableau Server | Sí | Sí | No | No | No | No |
Tableau Cloud | Sí | No | No | No | No | No |
Nota
Not all third-party BI tools support these authentication options even though they are supported in the MongoDB drivers. Test the features you want to use to confirm they work with your specific BI tool.
Deployment Compatibility Matrix
The following table shows which authentication mechanisms are available for each MongoDB deployment type:
Mecanismo de autenticación | Atlas | |
|---|---|---|
SCRAM | Sí | Sí |
X.509 | Sí | Sí |
LDAP | No | Sí |
Kerberos (GSSAPI) | No | Sí |
AWS IAM | Sí | No |
OIDC | Sí | Sí |
Importante
Starting in MongoDB 8.0, LDAP authentication and authorization is deprecated. LDAP is available and will continue to operate without changes throughout MongoDB 8, but will be removed in a future major release. Consider migrating to OIDC or another supported authentication mechanism. For more information, see LDAP Deprecation.
Consideraciones de seguridad
When configuring authentication for the SQL Interface, consider the following security best practices:
Use strong authentication mechanisms: Prefer X.509, OIDC, or Kerberos over password-based authentication when possible.
Enable TLS encryption: Always use TLS to protect credentials and data in transit.
Follow the principle of least privilege: Grant users only the minimum permissions required for their tasks.
Secure credential storage: Never hardcode credentials in connection strings. Use environment variables, credential files, or secure credential management systems.
Regular credential rotation: Implement regular rotation of passwords and certificates.
Monitor authentication events: Enable audit logging to track authentication attempts and failures.