Join us at MongoDB.local London on 7 May to unlock new possibilities for your data. Use WEB50 to save 50%.
Register now >
Docs Menu
Docs Home
/ /

SQL Interface Authentication

The SQL Interface supports multiple authentication mechanisms to connect to your MongoDB deployment. This page includes supported authentication methods, component compatibility, and deployment availability for both Atlas and self-managed MongoDB Enterprise deployments.

The following table shows which authentication mechanisms are supported by each SQL Interface component:

Componente
SCRAM
X.509
LDAP
GSSAPI
AWS IAM
OIDC

MongoDB SQL Schema Builder

Controlador ODBC

Controlador JDBC

Power BI Desktop

Power BI Gateway

No

No

No

No

No

Tableau Desktop

Tableau Server

No

No

No

No

Tableau Cloud

No

No

No

No

No

Nota

Not all third-party BI tools support these authentication options even though they are supported in the MongoDB drivers. Test the features you want to use to confirm they work with your specific BI tool.

The following table shows which authentication mechanisms are available for each MongoDB deployment type:

Mecanismo de autenticación
Atlas

SCRAM

X.509

LDAP

No

Kerberos (GSSAPI)

No

AWS IAM

No

OIDC

Importante

Starting in MongoDB 8.0, LDAP authentication and authorization is deprecated. LDAP is available and will continue to operate without changes throughout MongoDB 8, but will be removed in a future major release. Consider migrating to OIDC or another supported authentication mechanism. For more information, see LDAP Deprecation.

When configuring authentication for the SQL Interface, consider the following security best practices:

  • Use strong authentication mechanisms: Prefer X.509, OIDC, or Kerberos over password-based authentication when possible.

  • Enable TLS encryption: Always use TLS to protect credentials and data in transit.

  • Follow the principle of least privilege: Grant users only the minimum permissions required for their tasks.

  • Secure credential storage: Never hardcode credentials in connection strings. Use environment variables, credential files, or secure credential management systems.

  • Regular credential rotation: Implement regular rotation of passwords and certificates.

  • Monitor authentication events: Enable audit logging to track authentication attempts and failures.

  • Conéctate con el controlador JDBC

  • Conectar con ODBC Driver

  • Conexión desde Tableau

  • Conectar desde Power BI

Volver

Conectar y query

En esta página