Skip to main content
Learn how to configure secure connections to AWS-managed databases using IAM authentication, Secrets Manager, and best practices for production deployments.

Prerequisites: IAM Role Setup

Use attached IAM roles for secure, key-free authentication on EC2 instances. This eliminates the need to manage access keys. References: IAM roles for EC2 | IAM best practices | Using instance profiles

Create IAM Role

  1. Go to IAM Console → Roles
  2. Click Create role
  3. Select trusted entity type: AWS serviceEC2
  4. Attach policies as needed:
  5. Name the role: bytebase-instance-role

Attach IAM Role to EC2

New EC2 Instance:
  1. Launch instance in EC2 Console
  2. In Advanced detailsIAM instance profile: Select bytebase-instance-role
Existing EC2 Instance:
  1. Select instance → ActionsSecurityModify IAM role
  2. Select bytebase-instance-roleUpdate IAM role
Deploy Bytebase on your EC2 instance - credentials are provided automatically through the instance metadata service.

Alternative: IAM User with Access Keys

Use only when running Bytebase outside AWS. See why to use IAM roles instead of access keys.
  1. Create an IAM user with required policies
  2. Generate access keys
  3. Set environment variables:
    -e AWS_ACCESS_KEY_ID=xxx
    -e AWS_SECRET_ACCESS_KEY=yyy
    -e AWS_REGION=us-east-1
    
Reference: Managing access keys

RDS/Aurora with IAM Authentication

Prerequisites: IAM role with RDS connect permissions.
References: IAM database authentication | Connecting with IAM

Step 1: Configure RDS/Aurora Instance

  1. In RDS Console, modify your instance
  2. Enable IAM database authentication under Database authentication options
  3. Save changes (SSL is enabled by default)
Reference: Enabling IAM authentication

Step 2: Grant Database Connect Permission

Add this policy to your IAM role to allow RDS IAM authentication:
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": "rds-db:connect",
      "Resource": "arn:aws:rds-db:REGION:ACCOUNT_ID:dbuser:DB_RESOURCE_ID/bytebase"
    }
  ]
}
Replace REGION, ACCOUNT_ID, and DB_RESOURCE_ID with your values. Find DB_RESOURCE_ID in RDS console → Configuration tab. For easier setup, you can use wildcards: arn:aws:rds-db:*:*:dbuser:*/* Reference: IAM policy examples

Step 3: Create Database User

MySQL/Aurora MySQL:
CREATE USER 'bytebase'@'%' IDENTIFIED WITH AWSAuthenticationPlugin AS 'RDS';
ALTER USER 'bytebase'@'%' REQUIRE SSL;
GRANT ALL PRIVILEGES ON *.* TO 'bytebase'@'%';
PostgreSQL/Aurora PostgreSQL:
CREATE USER bytebase;
GRANT rds_iam TO bytebase;
-- Grant appropriate permissions
References: MySQL | PostgreSQL

Step 4: Connect from Bytebase

  1. Click New Instance in Bytebase
  2. Configure basic connection:
    • Host: Your RDS endpoint
    • Port: 3306 (MySQL) or 5432 (PostgreSQL)
    • Username: bytebase
    • Authentication: Select AWS RDS IAM
  3. Configure AWS credentials:
    • Credential Source: Select Default (recommended for same-account connections)
      • Automatically uses EC2 instance profile or environment variables
      • Database Region: Select your RDS region (e.g., us-east-1)
      • Database: Your database name
  4. Test and save the connection
For same-account connections on EC2, always use Default credential source. Bytebase automatically uses the instance profile to authenticate. Use Specific Credentials only for cross-account scenarios.

Cross-Account IAM Authentication

Available in Bytebase version 3.12.1 and later
Connect to RDS databases in different AWS accounts using IAM role assumption. This allows Bytebase running in Account A to authenticate to databases in Accounts B, C, D, etc.

Prerequisites

  • Bytebase running with an IAM role (EC2 instance profile or ECS task role)
  • Target RDS instances have IAM authentication enabled
  • Cross-account trust relationships configured

Step 1: Create Target Account Role

In each target AWS account (where databases reside):
  1. Go to IAM Console → Roles
  2. Click Create role
  3. Select trusted entity: Another AWS account
  4. Enter the source account ID (where Bytebase runs)
  5. Optionally add an External ID for additional security
  6. Name the role: bytebase-target-db-role
  7. After creating the role, add an inline policy for RDS access:
    • Go to the Permissions tab
    • Click Add permissionsCreate inline policy
    • Switch to JSON view and paste:
    {
      "Version": "2012-10-17",
      "Statement": [
        {
          "Effect": "Allow",
          "Action": "rds-db:connect",
          "Resource": "arn:aws:rds-db:REGION:ACCOUNT_ID:dbuser:DB_RESOURCE_ID/bytebase"
        }
      ]
    }
    
    For production, replace with specific values. Find your DB_RESOURCE_ID in RDS Console → your database → Configuration tab
  8. Note the role ARN: arn:aws:iam::TARGET_ACCOUNT:role/bytebase-target-db-role

Step 2: Configure Trust Relationship (Target Account)

In the target account, configure the trust policy for bytebase-target-db-role:
  1. Go to the role in IAM Console
  2. Select Trust relationships tab
  3. Click Edit trust policy
  4. Update with this policy (replace with your source account details):
    {
      "Version": "2012-10-17",
      "Statement": [
        {
          "Effect": "Allow",
          "Principal": {
            "AWS": "arn:aws:iam::SOURCE_ACCOUNT:role/bytebase-instance-role"
          },
          "Action": "sts:AssumeRole",
          "Condition": {
            "StringEquals": {
              "sts:ExternalId": "your-external-id"  // Optional but recommended
            }
          }
        }
      ]
    }
    

Step 3: Grant AssumeRole Permission (Source Account)

In the source account (where Bytebase runs), add permission to assume the target role:
  1. Go to your bytebase-instance-role in IAM Console
  2. Click Add permissionsCreate inline policy
  3. Switch to JSON view and paste:
    {
      "Version": "2012-10-17",
      "Statement": [
        {
          "Effect": "Allow",
          "Action": "sts:AssumeRole",
          "Resource": [
            "arn:aws:iam::ACCOUNT_B:role/bytebase-target-db-role",
            "arn:aws:iam::ACCOUNT_C:role/bytebase-target-db-role"
          ]
        }
      ]
    }
    
  4. Name the policy: AssumeTargetRoles
  5. Replace ACCOUNT_B, ACCOUNT_C with your target account IDs

Step 4: Configure Database User

Ensure the target RDS instance has:
  1. IAM authentication enabled (RDS Console → Modify → Database authentication options)
  2. A database user configured for IAM auth
For PostgreSQL:
CREATE USER bytebase;
GRANT rds_iam TO bytebase;
-- Grant necessary permissions
For MySQL:
CREATE USER 'bytebase'@'%' IDENTIFIED WITH AWSAuthenticationPlugin AS 'RDS';
ALTER USER 'bytebase'@'%' REQUIRE SSL;
-- Grant necessary permissions

Step 5: Configure Cross-Account Connection

  1. Click New Instance in Bytebase
  2. Configure basic connection:
    • Host: RDS endpoint in target account
    • Port: 3306 (MySQL) or 5432 (PostgreSQL)
    • Username: bytebase
    • Authentication: Select AWS RDS IAM
  3. Configure AWS credentials:
    • Credential Source: Select Specific Credentials (required for cross-account)
      • Access Key ID: Leave empty (uses EC2 instance profile)
      • Secret Access Key: Leave empty (uses EC2 instance profile)
      • Session Token: Leave empty
      • Role ARN: arn:aws:iam::TARGET_ACCOUNT:role/bytebase-target-db-role
      • External ID: Optional security string (if configured in trust policy)
      • Database Region: Select target RDS region
      • Database: Your database name
  4. Test and save the connection
Important: For cross-account access, always use Specific Credentials. Leave Access Key ID, Secret Access Key, and Session Token empty when using EC2 instance profile - only provide the Role ARN. Use Default credential source only for same-account connections.
How it works:
  1. Bytebase uses the EC2 instance profile credentials
  2. Assumes the specified role in the target account
  3. Generates RDS IAM authentication tokens using the assumed role
  4. Connects to the database using the token

Example Setup

Scenario: Bytebase in Account A (123456789012) connecting to RDS in Account B (987654321098) Account B - Create role with trust relationship: Configure the trust policy to allow the source account’s role to assume this role:
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::123456789012:role/bytebase-instance-role"
      },
      "Action": "sts:AssumeRole",
      "Condition": {
        "StringEquals": {
          "sts:ExternalId": "your-secure-external-id"
        }
      }
    }
  ]
}
Account A - Allow Bytebase to assume the role:
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": "sts:AssumeRole",
      "Resource": "arn:aws:iam::987654321098:role/bytebase-target-db-role"
    }
  ]
}
Need to test cross-account authentication but only have one AWS account? See our guide on testing cross-account authentication in a single account.

AWS Secrets Manager

Store database passwords securely in AWS Secrets Manager instead of Bytebase.
Prerequisites: IAM role with Secrets Manager permissions.

Step 1: Grant Secrets Manager Access

Add this policy to your IAM role to read secrets:
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "secretsmanager:GetSecretValue",
        "secretsmanager:DescribeSecret"
      ],
      "Resource": "arn:aws:secretsmanager:REGION:ACCOUNT_ID:secret:SECRET_NAME-*"
    }
  ]
}
Replace REGION, ACCOUNT_ID, and SECRET_NAME with your values. For easier setup, you can use wildcards: arn:aws:secretsmanager:*:*:secret:* Reference: Secrets Manager IAM permissions

Step 2: Create Secret

  1. Go to AWS Secrets Manager Console
  2. Click Store a new secret
  3. Select Other type of secret
  4. Add key/value pair: Key = DB_PASSWORD, Value = your password
  5. Name the secret (e.g., bytebase-db-password)
  6. Complete creation and note the ARN
Reference: Creating secrets

Step 3: Configure in Bytebase

  1. In your database instance settings, find the password field
  2. Click the key icon to use external secret
  3. Select AWS Secrets Manager
  4. Enter:
    • Secret Name: Your secret name from Step 2
    • Secret Key: DB_PASSWORD
  5. Test connection and save

Database-Specific Configuration

For specific database types running on AWS, see their configuration guides:
  • PostgreSQL on RDS
  • Aurora PostgreSQL
  • Aurora MySQL

Best Practices

  1. Use IAM Roles over Access Keys: Always prefer IAM roles when running on EC2
  2. Enable SSL/TLS: All AWS database services support encrypted connections
  3. Use Secrets Manager: Centralize password management with automatic rotation
  4. Follow Least Privilege: Grant only necessary permissions to IAM roles
  5. Monitor Access: Use CloudTrail to audit database access patterns

Troubleshooting

Connection Timeout

  • Verify security group rules allow traffic on database port
  • Check VPC routing and subnet configuration
  • Ensure database is publicly accessible or use VPN/bastion host

IAM Authentication Failed

  • Verify IAM role has correct rds-db:connect permissions
  • Check database user was created with correct authentication method
  • Ensure SSL is enabled for the connection

Secrets Manager Access Denied

  • Verify IAM role has secretsmanager:GetSecretValue permission
  • Check secret ARN matches the policy resource
  • Ensure secret exists in the correct region