Postview LogoPostview

SSH Tunnel

Connect to databases through SSH tunnels for secure remote access.

What is an SSH Tunnel

An SSH tunnel creates a secure, encrypted connection through an SSH server to access databases that are not directly accessible from your local machine. This is particularly useful when:

  • Database servers are behind firewalls and only accessible from specific hosts
  • Security policies require all database access to go through SSH
  • Remote development where databases are hosted on private networks
  • Cloud environments where databases are in private subnets

How SSH Tunnels Work

  1. Postview establishes an SSH connection to your server
  2. Creates a secure tunnel through the SSH connection
  3. Forwards database traffic through the tunnel to the target database
  4. Maintains encryption throughout the entire connection

Connection Options

1. SSH Host

The hostname or IP address of the SSH server that will tunnel your connection.

Examples:

  • 192.168.1.100
  • ssh.example.com

2. SSH Port

The port number for the SSH service. Default is 22.

Common ports:

  • 22 (standard SSH)
  • 2222 (alternative SSH port)

3. SSH Username

The username for authenticating to the SSH server.

4. Authentication Method

Choose between password or private key authentication:

Password Authentication

  • SSH Password: Enter the password for the SSH user account

Private Key Authentication

  • Private Key Path: Path to your private key file (e.g., ~/.ssh/id_rsa)
  • Key Passphrase: Password for the private key (if the key is encrypted)

Security Tip: Private key authentication is more secure than password authentication. Consider using SSH keys for production environments.

SSH Tunnel