Database Integration

Redis

Connect TigerIdentity to Redis for dynamic ACL management, just-in-time access, and comprehensive command auditing for your in-memory data stores.

Key Features

ACL Management

Manage Redis ACL rules dynamically, granting fine-grained access to keys and commands.

User Provisioning

Automate Redis user lifecycle with just-in-time provisioning and deprovisioning.

Just-in-Time Access

Grant temporary database access that automatically expires after the specified duration.

Command Restrictions

Control which Redis commands users can execute based on context and risk level.

Audit Logging

Track all Redis operations with complete audit trails for compliance and security.

Session-Based Access

Issue time-limited access tokens that revoke automatically when sessions end.

How It Works

1

Configure Admin Access

Provide TigerIdentity with admin credentials to manage Redis users and ACL rules.

2

Sync ACLs

TigerIdentity syncs existing users, ACL rules, and command permissions from your Redis cluster.

3

Request Access

Users request temporary Redis access with specific key patterns and command permissions through TigerIdentity.

Configuration Example

connector:
  type: redis
  name: "redis-cache-cluster"

  config:
    host: "redis.company.com"
    port: 6379
    admin_user: "${REDIS_ADMIN_USER}"
    admin_password: "${REDIS_ADMIN_PASSWORD}"
    tls:
      enabled: true
      verify_cert: true
    cluster_mode: true

  sync:
    users: true
    acls: true

  provisioning:
    enabled: true
    user_prefix: "tiger_"
    default_ttl: 1800
    max_ttl: 14400
    default_commands:
      - get
      - set
      - del
      - expire
    restricted_commands:
      - flushdb
      - flushall
      - config
      - shutdown
    key_patterns:
      read_only: "~cache:*"
      read_write: "~session:{{username}}:*"

Use Cases

Zero Standing Cache Access

Eliminate permanent Redis credentials. Grant developers temporary access to cache clusters only when needed.

Session Store Security

Control access to session data with user-specific key patterns and automatic credential rotation.

Break-Glass Access

Enable emergency access to Redis with elevated privileges for incident response with full audit trails.

Command-Level Controls

Restrict dangerous commands like FLUSHDB or CONFIG to approved personnel with MFA and approval workflows.

Ready to connect Redis?

See how TigerIdentity transforms in-memory database access security in a personalized demo.

Schedule Your Demo