Redis
Connect TigerIdentity to Redis for dynamic ACL management, just-in-time access, and comprehensive command auditing for your in-memory data stores.
Key Features
ACL Management
Manage Redis ACL rules dynamically, granting fine-grained access to keys and commands.
User Provisioning
Automate Redis user lifecycle with just-in-time provisioning and deprovisioning.
Just-in-Time Access
Grant temporary database access that automatically expires after the specified duration.
Command Restrictions
Control which Redis commands users can execute based on context and risk level.
Audit Logging
Track all Redis operations with complete audit trails for compliance and security.
Session-Based Access
Issue time-limited access tokens that revoke automatically when sessions end.
How It Works
Configure Admin Access
Provide TigerIdentity with admin credentials to manage Redis users and ACL rules.
Sync ACLs
TigerIdentity syncs existing users, ACL rules, and command permissions from your Redis cluster.
Request Access
Users request temporary Redis access with specific key patterns and command permissions through TigerIdentity.
Configuration Example
connector:
type: redis
name: "redis-cache-cluster"
config:
host: "redis.company.com"
port: 6379
admin_user: "${REDIS_ADMIN_USER}"
admin_password: "${REDIS_ADMIN_PASSWORD}"
tls:
enabled: true
verify_cert: true
cluster_mode: true
sync:
users: true
acls: true
provisioning:
enabled: true
user_prefix: "tiger_"
default_ttl: 1800
max_ttl: 14400
default_commands:
- get
- set
- del
- expire
restricted_commands:
- flushdb
- flushall
- config
- shutdown
key_patterns:
read_only: "~cache:*"
read_write: "~session:{{username}}:*"Use Cases
Zero Standing Cache Access
Eliminate permanent Redis credentials. Grant developers temporary access to cache clusters only when needed.
Session Store Security
Control access to session data with user-specific key patterns and automatic credential rotation.
Break-Glass Access
Enable emergency access to Redis with elevated privileges for incident response with full audit trails.
Command-Level Controls
Restrict dangerous commands like FLUSHDB or CONFIG to approved personnel with MFA and approval workflows.
Ready to connect Redis?
See how TigerIdentity transforms in-memory database access security in a personalized demo.
Schedule Your Demo