Support disconnect_expired_cert for database access #5476
Labels
database-access
Database access related issues and PRs
feature-request
Used for new features in Teleport, improvements to current should be #enhancements
Milestone
Feature Request
Teleport provides a
disconnect_expired_cert
setting that can be set cluster-wide on the auth server and/or on the role level which controls whether an active connection should be terminated in case of the client certificate expiration. This setting currently does not have any effect on the database access connections.To add support, database access connections should use the same monitor used by SSH server and Kubernetes forwarder:
https://github.com/gravitational/teleport/blob/v6.0.0-alpha.2/lib/srv/ctx.go#L335
https://github.com/gravitational/teleport/blob/v6.0.0-alpha.2/lib/kube/proxy/forwarder.go#L1261
Motivation
This setting is important for compliance purposes.
Who's it for?
OSS User, Pro, Enterprise, Cloud
The text was updated successfully, but these errors were encountered: