Identity (Static)
Who the user is — verified through IDP integrations and StrongAuth. The foundation of access control.
Device Context
Trust the device — endpoint verification via EPP/EDR integrations ensures the machine meets security posture requirements.
Time & Location
Context-aware controls based on IP address, geographic location, and time-of-day to flag unusual access patterns.
Action Control (New!)
The newest trust layer — scrutinize and control the specific database actions a user performs, not just whether they have access.
- Binary grant: in or out
- Authorizes access to the whole resource
- Visibility exists but cannot prevent misuse
- Reactive — clean up after an incident
- Fine-grained per-action authorization
- Controls atomic operations (SELECT, DROP, etc.)
- Context evaluated continuously in-session
- Proactive — prevents unsanctioned actions
Permissions are fine-grained and context is evaluated continuously throughout the session for every type of action. Currently supported for PostgreSQL resources — support for additional database types will follow.
Each policy contains one or more statements. Each statement is a rule that either permits or forbids a user (or principal) to act on a resource, given a defined context.
StrongDM uses Cedar-based policies — a structured policy language — alongside a zero-trust, context-based evaluation engine. Policies can also introduce friction mechanisms: MFA challenges, approval workflows, and action justification requirements.
| Topic | Link |
|---|---|
| Context-based policies overview | strongdm.com/docs/admin/policies/#overview |
| Allow or forbid access by default | #allow-or-forbid-access-by-default |
| Policy Library | #policy-library |
| Policy Editor | #policy-editor |
| Policy Evaluation | #policy-evaluation |
| Policy Monitor | #policy-monitor |
| Viewing Policy Logs | docs/.../view/#view-policy-logs |
📝 Knowledge Check — Policies
1. What is the key difference between Policy-Based ACCESS Control and Policy-Based ACTION Control?
2. Which friction mechanism can a policy introduce in addition to allow/deny?
Postgres & SSH
Enforce MFA at connection time for PostgreSQL databases and SSH server sessions. Video walkthrough: 5 min 22 sec.
Windows Remote Desktop
Require MFA before granting RDP access to Windows servers. Video walkthrough: 2 min 28 sec.
Network Devices
Apply MFA enforcement to routers and switches managed through StrongDM. Video: 2 min 57 sec.
Oracle DB
MFA enforcement for Oracle database access. Video walkthrough available: 3 min 22 sec.
StrongDM supports Time-Based One Time Passwords (TOTP) natively, as well as MFA via Duo and Okta. Each integration has its own setup guide in StrongDM TechDocs.
| Topic | Link |
|---|---|
| Multi-Factor Authentication (TechDocs) | docs/.../authentication/mfa/ |
| Setting up MFA | #set-up-multi-factor-authentication |
| MFA with Duo | docs/.../mfa-duo/ |
| MFA with Okta | docs/.../mfa-okta/ |
| Blog: Why MFA is Important | strongdm.com/blog/why-mfa-is-important |
📝 Knowledge Check — MFA
1. Why is full-featured MFA not available in the StrongDM-in-a-box lab?
Amazon Web Services
Supports AWS, AWS Management Console, and AWS Management Console (Static Key Pair) resource types within StrongDM.
Microsoft Azure
Supports both Azure (Certificate) and Azure (Password) authentication types for cloud resource access control.
Google Cloud Platform
GCP cloud resource type enables StrongDM-governed access to Google Cloud infrastructure and services.
Snowsight
Snowsight (Snowflake Web Console) is supported as a cloud resource type for governing access to Snowflake analytics environments.
| Topic | Duration |
|---|---|
| Configure AWS CLI in StrongDM | 3 min 50 sec |
| Configure Azure CLI in StrongDM | 2 min 54 sec |
| Configure Google CLI in StrongDM | 2 min 34 sec |
| Topic | Link |
|---|---|
| Cloud Resources (TechDocs) | docs/admin/resources/clouds/ |
TCP logs are accessible at Logs > Queries in the Admin UI. Compare this to a Website resource, whose logs appear at Logs > Web and contain full HTTP request headers, URLs, methods, and more.
TCP as the generic server type. Other options include RDP, RDP (Certificate Based), and various SSH types.3389.1024 and 59999 not used by any other resource. The StrongDM client listens on this port and forwards traffic to the resource.| Topic | Link |
|---|---|
| Add a TCP connection | docs/.../servers/rawtcp/ |
📝 Knowledge Check — TCP
1. What data does a TCP connection resource record in its logs?
StrongDM supports four SSH server types, differing in how credentials are passed to the resource:
StrongDM automatically records SSH sessions for later replay. Session recordings become available after the session ends at Logs > SSH in the Admin UI.
Replays can be viewed two ways:
Logs > SSH, find the session, and click the play button directly in the browser interface.sdm ssh play <session-id> command shown in the UI and run it on your terminal/command line.| Topic | Link |
|---|---|
| SSH with Public Key | docs/.../ssh-public-key/ |
| SSH with Customer Managed Key | docs/.../ssh-customer-key/ |
| SSH with Certificate Auth | docs/.../ssh-certificate-auth/ |
| Identity Alias for SSH | docs/.../ssh-identity-alias/ |
| Port Forwarding | docs/.../port-forwarding/ |
| Viewing SSH Replays | docs/.../view/#view-ssh-replays |
📝 Knowledge Check — SSH
1. Where are SSH session replays found in the StrongDM Admin UI?
2. How many SSH server types does StrongDM support?
127.0.0.1:10003. StrongDM auto-assigns this port during resource creation.StrongDM supports two RDP server types, differing in how credentials are passed:
StrongDM records RDP sessions as visual replays — including the actual desktop interactions. Replays become available after the session ends at Logs > RDP in the Admin UI.
Unlike SSH (which also supports CLI replay), RDP replays are viewed only from the Admin UI — click the Play button next to the session entry in the RDP Replays log.
- Both support session recording
- Both use Port Override (auto-assigned)
- Both support Certificate Auth variants
- Both support Identity Alias
- Replays viewable in Admin UI
- SSH: 4 server types; RDP: 2 types
- SSH replays viewable via CLI too
- RDP: visual desktop replay; SSH: terminal text
- SSH logs at
Logs > SSH; RDP atLogs > RDP
| Topic | Link |
|---|---|
| Connect to RDP server | docs/.../servers/rdp/ |
| RDP with Certificate Auth | docs/.../rdp-certificate-auth/ |
| Identity Alias for RDP | docs/.../rdp-identity-alias/ |
| Viewing RDP Replays | docs/.../view/#view-rdp-replays |