SSH Tunnel
Connect to databases through SSH tunnels for secure remote access.
What is an SSH Tunnel
An SSH tunnel creates a secure, encrypted connection through an SSH server to access databases that are not directly accessible from your local machine. This is particularly useful when:
- Database servers are behind firewalls and only accessible from specific hosts
- Security policies require all database access to go through SSH
- Remote development where databases are hosted on private networks
- Cloud environments where databases are in private subnets
How SSH Tunnels Work
- Postview establishes an SSH connection to your server
- Creates a secure tunnel through the SSH connection
- Forwards database traffic through the tunnel to the target database
- Maintains encryption throughout the entire connection
Connection Options
1. SSH Host
The hostname or IP address of the SSH server that will tunnel your connection.
Examples:
192.168.1.100
ssh.example.com
2. SSH Port
The port number for the SSH service. Default is 22
.
Common ports:
22
(standard SSH)2222
(alternative SSH port)
3. SSH Username
The username for authenticating to the SSH server.
4. Authentication Method
Choose between password or private key authentication:
Password Authentication
- SSH Password: Enter the password for the SSH user account
Private Key Authentication
- Private Key Path: Path to your private key file (e.g.,
~/.ssh/id_rsa
) - Key Passphrase: Password for the private key (if the key is encrypted)
Security Tip: Private key authentication is more secure than password authentication. Consider using SSH keys for production environments.