LogoLogo
  • Getting Started
    • Welcome to Teleskope.ai
    • Your Journey with Teleskope
  • The Platform
    • Data Catalog
    • Data Subject Rights
      • Integrations
      • Enroll Third Party Integrations
        • Amplitude
        • Google Analytics
        • Salesforce
        • Bazaar Voice
        • Intercom
        • Adyen
      • Enroll Structured Databases
      • Deletion Methods
    • Policy Maker
    • Issues
    • API Service
      • Scanning API
        • v1/classify
        • v1/classifyCollection
        • v1/scan
      • Redaction API
        • v1/scrub
      • Data Subject Rights
        • GET v1/dsr/requests
        • POST v1/dsr/requests
      • Metadata
        • v1/aws/rds
        • v1/aws/s3
        • v1/snowflake
        • v1/snowflake/users
        • v1/gcp/bigquery
        • v1/gcp/cloudstorage
        • v1/gcp/cloudsql
  • Setup
    • Deployment
    • Role Based Access Control
    • SSO
      • Okta
      • Microsoft Entra
      • Google Auth
  • Specifications
    • Data Store Coverage
    • Compliance Frameworks
    • Redaction Methodologies
    • Data Elements
  • Connectors
    • AWS
      • Athena
      • RDS
      • DynamoDB
      • Redshift
      • S3
      • SNS
      • SQS
    • GCP
      • Cloud Storage
      • Grant Teleskope Access to BigQuery
      • CloudSQL
      • Grant Teleskope Access to CloudLogging
    • SaaS
      • Github
      • Google Drive
      • Jira
      • Segment
      • Zendesk
      • DropBox
      • Box
      • Bitbucket
      • Slack
      • Sharepoint Online
    • Snowflake
    • Azure
      • Azure SQL
      • Azure Database
      • Blob Storage
      • CosmosDB
      • Synapse
    • Databricks
  • DSR
  • Alerting Integrations
    • Slack
    • Tines
Powered by GitBook
On this page
  • Requirements
  • Integration
  • Grant the Teleskope App the following roles:
  • Create a Teleskope user on each database
  • Create Teleskope User
  • Grant Read Access to Teleskope user
  • MySQL or MariaDB
  • Postgres versions 14+
  • Postgres versions < 14
  • Grant Write Access to Teleskope user (optional)
  • MySQL or MariaDB
  • Postgres versions 14+
  • Postgres versions < 14

Was this helpful?

  1. Connectors
  2. Azure

Azure Database

Requirements

In order to integrate Teleskope with Azure Database for MySQL, Postgres, or MariaDB, you must make sure the following prerequisites are met:

  • Within Azure: You must have created an Entra App as described previously

  • Within Teleskope: A Teleskope admin account to complete the setup process.

Integration

1

Grant the Teleskope App the following roles:

Reader

2

Create a Teleskope user on each database

For each SQL instance you would like to scan using Teleskope, you will need to create/provide credentials for a database user, and grant that user permissions.

Create Teleskope User

Create Database User (Without IAM Authentication)

MySQL or MariaDB

CREATE USER teleskope IDENTIFIED BY '****PASSWORD****'

Postgres

CREATE USER teleskope WITH PASSWORD  '****PASSWORD****'
3

Grant Read Access to Teleskope user

MySQL or MariaDB

GRANT SHOW DATABASES, SELECT ON *.* TO teleskope

Postgres versions 14+

GRANT pg_read_all_data TO teleskope

Postgres versions < 14

SELECT format('GRANT CONNECT ON DATABASE %I TO teleskope;', datname) FROM pg_database \gexec
SELECT format('GRANT USAGE ON SCHEMA %I TO teleskope;', nspname) FROM pg_namespace \gexec
SELECT format('GRANT SELECT ON ALL TABLES IN SCHEMA %I TO teleskope;', nspname) FROM pg_namespace \gexec
4

Grant Write Access to Teleskope user (optional)

MySQL or MariaDB

GRANT UPDATE, DELETE on *.* TO teleskope

Postgres versions 14+

GRANT pg_write_all_data TO teleskope

Postgres versions < 14

SELECT format('GRANT UPDATE, DELETE ON ALL TABLES IN SCHEMA %I TO teleskope;', nspname)

PreviousAzure SQLNextBlob Storage

Last updated 5 months ago

Was this helpful?