User Management
Control who has access to your DB Audit organization with role-based access control, SSO integration, and granular permissions.
Roles & Permissions
DB Audit uses role-based access control (RBAC) to manage what users can see and do. Assign roles based on job function to follow the principle of least privilege.
Owner
Full access to all features, billing, and organization settings. Can delete the organization.
- All permissions
- Manage billing
- Delete organization
Admin
Manage users, databases, policies, and integrations. Cannot access billing or delete the organization.
- Manage users
- Manage databases
- Manage policies
- Configure integrations
- View all data
Analyst
View and investigate events, create reports, and manage alerts. Cannot modify configurations.
- View events
- Create reports
- Manage own alerts
- Export data
- View policies
Viewer
Read-only access to dashboards and events. Ideal for compliance auditors.
- View dashboards
- View events
- View reports
Teams
Organize users into teams to manage database access at scale. Teams can be scoped to specific databases using patterns.
Database Scoping
Restrict team access to specific databases using wildcard patterns (e.g., db_prod_*).
Default Roles
Set a default role for team members. Individual users can have elevated permissions.
SSO Integration
Auto-assign users to teams based on IdP groups via SAML or OIDC claims.
# Create a team
curl -X POST "https://api.dbaudit.ai/v1/teams" \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{
"name": "Security Operations",
"description": "SOC team for incident response",
"database_access": ["db_prod_*", "db_staging_*"],
"default_role": "analyst"
}' Authentication Methods
Email & Password
Standard authentication with email verification and password requirements.
- Email verification required
- Configurable password policy
- Password reset via email
SSO (SAML 2.0)
Enterprise single sign-on with SAML identity providers.
- Okta, Azure AD, OneLogin, Google Workspace
- Just-in-time provisioning
- Automatic role mapping
SSO (OIDC)
OpenID Connect integration for modern identity providers.
- Auth0, Keycloak, custom providers
- OAuth 2.0 flow
- Custom claim mapping
LDAP / Active Directory
Direct bind authentication against on-premise directory services. Ideal for air-gapped environments.
- LDAP and LDAPS (port 636) support
- Active Directory with nested group resolution
- Works fully offline — no cloud IdP required
API Keys
Programmatic access for integrations and automation.
- Scoped permissions
- Expiration dates
- Usage tracking
Multi-Factor Authentication
Protect accounts with MFA. Admins can enforce MFA organization-wide for compliance.
Authenticator Apps
Google Authenticator, Authy, 1Password, and any TOTP-compatible app.
Security Keys
WebAuthn/FIDO2 support for YubiKey and other hardware tokens.
Recovery Codes
One-time backup codes for account recovery if MFA device is lost.
SSO Configuration (SAML)
Configure SAML 2.0 SSO to allow users to authenticate with your identity provider. Supports automatic user provisioning and role mapping.
Enterprise Feature
SSO is available on Enterprise plans. Contact sales to enable SSO for your organization.
# SAML SSO Configuration (Admin Dashboard)
{
"sso_provider": "saml",
"entity_id": "https://dbaudit.ai/saml/your-org",
"acs_url": "https://api.dbaudit.ai/auth/saml/callback",
"idp_metadata_url": "https://your-idp.com/metadata.xml",
"attribute_mapping": {
"email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
"name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
"groups": "http://schemas.microsoft.com/ws/2008/06/identity/claims/groups"
},
"role_mapping": {
"DBaudit-Admins": "admin",
"DBaudit-Analysts": "analyst",
"DBaudit-Viewers": "viewer"
},
"jit_provisioning": true,
"enforce_sso": false
} LDAP / Active Directory
For on-premise and air-gapped deployments, DB Audit supports direct LDAP/Active Directory authentication. This allows users to log in with their corporate credentials without requiring any cloud-based identity provider.
LDAP & LDAPS
Supports LDAP (port 389) and secure LDAPS (port 636) with TLS. Always use LDAPS in production.
Group-Based Roles
Map Active Directory groups to DB Audit roles automatically, including nested group resolution.
Fully Offline
Works entirely within your network. No internet connectivity required — ideal for air-gapped environments.
# LDAP / Active Directory Configuration
{
"auth_provider": "ldap",
"ldap": {
"host": "ldap.internal.company.com",
"port": 636,
"use_ssl": true,
"bind_dn": "CN=dbaudit-svc,OU=Service Accounts,DC=company,DC=com",
"bind_password": "${LDAP_BIND_PASSWORD}",
"base_dn": "OU=Users,DC=company,DC=com",
"user_filter": "(sAMAccountName={username})",
"group_filter": "(member={user_dn})",
"attributes": {
"username": "sAMAccountName",
"email": "mail",
"display_name": "displayName",
"groups": "memberOf"
},
"group_mapping": {
"CN=DBaudit-Admins,OU=Groups,DC=company,DC=com": "admin",
"CN=DBaudit-Analysts,OU=Groups,DC=company,DC=com": "analyst",
"CN=DBaudit-Viewers,OU=Groups,DC=company,DC=com": "viewer"
},
"connection_timeout": "10s",
"request_timeout": "30s"
}
} ADFS SAML Configuration (On-Premise IdP)
For organizations using Active Directory Federation Services (ADFS), DB Audit supports SAML 2.0 SSO with ADFS as the identity provider. This keeps authentication entirely on-premise.
Air-Gapped Compatible
ADFS SAML authentication works fully offline with on-premise ADFS servers. No cloud connectivity needed.
# ADFS SAML Configuration (On-Premise IdP)
{
"sso_provider": "saml",
"entity_id": "https://dbaudit.internal.company.com/saml",
"acs_url": "https://dbaudit.internal.company.com/auth/saml/callback",
"idp_metadata_url": "https://adfs.company.com/FederationMetadata/2007-06/FederationMetadata.xml",
"attribute_mapping": {
"email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
"name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
"groups": "http://schemas.xmlsoap.org/claims/Group"
},
"role_mapping": {
"DBaudit-Admins": "admin",
"DBaudit-Analysts": "analyst",
"DBaudit-Viewers": "viewer"
},
"jit_provisioning": true,
"enforce_sso": true
} MFA Works Offline
TOTP-based MFA (Google Authenticator, Authy, etc.) and hardware security keys (YubiKey) work entirely offline. No internet connection is required for multi-factor authentication in air-gapped environments.
API Keys
Create API keys for programmatic access. Keys can be scoped to specific permissions and restricted by IP address.
Available Scopes
events:read Read audit events events:export Export events to files policies:read View audit policies policies:write Create and modify policies databases:read View database configurations databases:write Add and configure databases users:read View user list users:write Manage users and roles alerts:read View alert configurations alerts:write Configure alert rules reports:read View and download reports reports:write Generate and schedule reports # Create an API key
curl -X POST "https://api.dbaudit.ai/v1/api-keys" \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{
"name": "CI/CD Integration",
"scopes": ["events:read", "policies:read"],
"expires_at": "2026-01-15T00:00:00Z",
"allowed_ips": ["10.0.0.0/8"]
}'
# Response (key shown only once)
{
"id": "key_xyz789",
"name": "CI/CD Integration",
"key": "dbaudit_live_abc123xyz...",
"scopes": ["events:read", "policies:read"],
"created_at": "2025-01-15T10:00:00Z",
"expires_at": "2026-01-15T00:00:00Z"
} Managing Users via API
Invite a User
# Invite a new user
curl -X POST "https://api.dbaudit.ai/v1/users/invite" \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{
"email": "analyst@company.com",
"role": "analyst",
"teams": ["security-team"],
"send_email": true
}'
# Response
{
"id": "usr_abc123",
"email": "analyst@company.com",
"role": "analyst",
"status": "pending",
"invite_expires_at": "2025-01-22T10:00:00Z"
} List Users
# List all users in the organization
curl -X GET "https://api.dbaudit.ai/v1/users" \
-H "Authorization: Bearer YOUR_API_KEY"
# Response
{
"users": [
{
"id": "usr_owner1",
"email": "admin@company.com",
"name": "John Admin",
"role": "owner",
"status": "active",
"last_login": "2025-01-15T09:30:00Z",
"mfa_enabled": true
},
{
"id": "usr_abc123",
"email": "analyst@company.com",
"name": "Jane Analyst",
"role": "analyst",
"status": "active",
"teams": ["security-team"],
"last_login": "2025-01-14T14:22:00Z",
"mfa_enabled": true
}
],
"pagination": { "total": 12, "page": 1 }
} Update User Role
# Update user role
curl -X PATCH "https://api.dbaudit.ai/v1/users/usr_abc123" \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{
"role": "admin"
}' User Activity Audit Log
All user actions in DB Audit are logged for compliance and security. View who made changes, when, and from where.
| Action | Description |
|---|---|
user.login | User logged in (includes IP, device, location) |
user.invited | New user was invited to the organization |
user.role_changed | User's role was modified |
user.removed | User was removed from the organization |
policy.created | Audit policy was created |
database.added | New database connection was configured |
api_key.created | New API key was generated |