Web server configuration
Overview¶
The Server Configuration panel in Team Edition enables administrators to manage server settings important for the server. The panel is structured into distinct sections, each dedicated to specific aspects of server management.
To access the Server Configuration, navigate as administrator to Settings -> Administration -> Server Configuration.
The sections within the Server Configuration include:
- Server Information: Specifies essential server details.
- Configuration: Manages general configurations.
- Authentication Settings: Controls the methods for authentication.
- Security: Manages the storage of credentials.
- Disabled drivers: Allows to disable specific drivers on the server.
Note
The availability and specific options of the settings in the Server Configuration panel may vary between different versions of Team Edition.
Server information¶
Setting name | Description |
---|---|
Server Name | The name assigned to the server for identification purposes. |
Server URL | The URL through which the server can be accessed. |
Session lifetime | Specify the duration, in minutes, for which a session remains active before expiring. |
Configuration¶
Setting name | Description | Additional article |
---|---|---|
Navigator simple view | Shows only basic information in new connections within the navigation tree. | Simple and advanced view. |
Services integration¶
Setting name | Description | Additional article |
---|---|---|
AI Integration | Enables AI-powered features throughout the application, including AI Chat, database object descriptions, intelligent SQL query optimization, and error correction. | AI smart assistance |
Allow drivers downloading | Enables downloading JDBC drivers from external sources (Maven, GitHub). | |
Cloud (AWS) | Enables AWS cloud services. | AWS Settings |
Cloud (Azure) | Enables Microsoft Azure cloud services. | Cloud Explorer |
Cloud (Google) | Enables Google Cloud services. | Cloud Explorer |
Cloud Storage | Enables cloud file systems (e.g. S3). Users can access files in cloud storages if they have appropriate permissions. | Cloud Storage |
DBeaver Proxy Driver | Adds DBeaver Proxy Driver protocol support. It allows using JDBC proxy to connect to databases accessible to DBeaver server. | |
DBeaver Database Tunnel | Enables DBeaver Database Tunnel. Allows native database drivers to connect to databases accessible through DBeaver server. | DBeaver Database Tunnel |
Enable desktop application | Enables access from desktop application. When disabled, users can work only through the web interface. | |
Git | Integrates Team Edition with Git services for version control. | Team Edition Git integration. |
Resource management¶
Setting name | Description | Additional article |
---|---|---|
Enable Resource Manager | Activates the Resource Manager, allowing users to store and manage scripts on the server. | Resource manager. |
Secret Management | Enables Secret Management functionality. | Secret Management |
Authentication settings¶
The Authentication Settings section allows enabling various authentication methods that can later be configured in the Identity Provider tab.
Tip
For more information, see Authentication methods.
Security¶
Setting name | Description |
---|---|
Save credentials | Allows saving credentials for pre-configured databases. |
Save users credentials | Allows saving credentials for non-admin users. |
Disabled drivers¶
The Disabled Drivers section allows administrators to control the availability of database drivers on the server.
- Search for the driver: Enter the name of a specific driver in the search field to quickly locate it.
- Disabling a driver: Select the desired driver from the search results to disable it.
- Enabling a driver: To re-enable a disabled driver, click on the
X
next to its name in the list.Tip
For more information on how to manage these settings through the configuration file, see Server configuration.
Insecure drivers¶
Certain database drivers are disabled by default due to security risks. This primarily affects embedded databases, which have direct access to the local file system. If enabled, these drivers may allow users to read local files with the same permissions as the system user running the application. As a result, this could lead to unauthorized access to sensitive data and potential security vulnerabilities.
If an administrator enables one of these drivers, a warning notification will appear to highlight the associated security risks. Before enabling such drivers, it is strongly recommended to assess whether they are necessary and implement appropriate security controls to mitigate potential threats.