-
Notifications
You must be signed in to change notification settings - Fork 479
Password policy
- Example configuration
- Configuration properties
- Applying password policy
- Brute force protection policy
- Login brute force protection
- Connection brute force protection
This document provides guidelines for configuring the password policy in CloudBeaver. Administrators can define rules for user passwords to enhance security and comply with organizational requirements. These settings, applied globally, ensure passwords meet the specified standards during creation and update processes.
For more details on configuration, see the CloudBeaver server configuration.
The Password Policy configuration is located under the server.sm section of
the main server configuration file.
| Name | Environment Variable | Description |
|---|---|---|
minLength |
CLOUDBEAVER_POLICY_MIN_LENGTH |
Specifies the minimum length requirement for user passwords. |
requireMixedCase |
CLOUDBEAVER_POLICY_REQUIRE_MIXED_CASE |
Enforces the use of both uppercase and lowercase letters in passwords. |
minNumberCount |
CLOUDBEAVER_POLICY_MIN_NUMBER_COUNT |
Sets the minimum number of numeric characters required in passwords. |
minSymbolCount |
CLOUDBEAVER_POLICY_MIN_SYMBOL_COUNT |
Defines the minimum number of special symbols required in passwords. |
enableBruteForceProtection |
CLOUDBEAVER_BRUTE_FORCE_PROTECTION_ENABLED |
Enables brute force protection for login attempts. |
expiredAuthAttemptInfoTtl |
CLOUDBEAVER_EXPIRED_AUTH_ATTEMPT_INFO_TTL |
Time-to-live (TTL) for expired authentication attempt information (in minutes). |
maxFailedLogin |
CLOUDBEAVER_MAX_FAILED_LOGINS |
Maximum number of allowed failed login attempts before blocking access. |
minimumLoginTimeout |
CLOUDBEAVER_MINIMUM_LOGIN_TIMEOUT |
Minimum timeout duration (in minutes) before the next login attempt. |
blockLoginPeriod |
CLOUDBEAVER_BLOCK_PERIOD |
Period (in seconds) for which a login is blocked after maximum failed attempts. |
connectionBruteForce |
CLOUDBEAVER_CONNECTION_BF_PROTECTION_ENABLED |
Enables brute force protection for database connection attempts. |
maxFailedConnectAttempts |
CLOUDBEAVER_CONNECTION_BF_PROTECTION_MAX_ATTEMPTS |
Number of failed database connection attempts allowed before the connection is temporarily blocked. Applies to non-admin users only. After reaching the limit, the connection is blocked for a timeout period before it can be retried. |
errorAttemptsPeriodInMinutes |
CLOUDBEAVER_CONNECTION_BF_PROTECTION_ERROR_ATTEMPTS_PERIOD |
Time window (in minutes) for checking failed connection attempts. |
blockTimeInMinutes |
CLOUDBEAVER_CONNECTION_BF_BLOCK_PERIOD |
Block duration (in minutes) after exceeding the allowed number of failed connection attempts. |
The configured password policy will be applied during password create and change processes. The CloudBeaver will check the entered passwords against the defined policy, and users will be prompted to update their passwords if they do not meet the specified requirements.

CloudBeaver supports two types of brute force protection:
- Login brute force protection - limits failed login attempts to the CloudBeaver
-
Connection brute force protection
- limits failed database connection attempts through CloudBeaver
These policies help prevent unauthorized access by temporarily blocking logins or database connections after repeated failures.
When the policy is enabled and the failed attempts threshold is reached, CloudBeaver:
- For login brute force - the user is temporarily blocked and must wait before trying again
- For connection brute force - the database connection is blocked for a timeout period (applies to non-admin users only)
The admin panel logs when the block happened and the reason.
To allow a user to connect again, wait for the timeout to expire or adjust the limits in the configuration.
This policy controls how CloudBeaver reacts to multiple failed login attempts.
When enabled, it tracks incorrect passwords during user authentication. After a set number of failures, the user is temporarily blocked and must wait before trying again.
Note: This feature is available in Enterprise, AWS, and Team editions only.
This policy tracks failed attempts to connect to a database through CloudBeaver.
If a non-admin user reaches the allowed number of failed connection attempts (for example, when connecting to Redshift with a wrong password), CloudBeaver blocks the connection for the configured timeout.
During the block period, the user cannot retry the same connection. After the timeout expires, they can attempt again.
Supported databases:
- Amazon Redshift
- Db2
- Microsoft SQL Server
- MySQL
- Oracle Database
- PostgreSQL
- Getting started
- Create connection
- Connection network options
- Supported databases
-
Drivers management
- Database authentication methods
- Database navigator
- Properties editor
- Data editor
- SQL editor
-
Entity relation diagrams
- Cloud services
-
AI Smart assistance
- Data transfer
- General user guide
- Administration
- Server configuration
-
Server security and access configuration
- Authentication methods
- Access management
- Proxy configuration
-
Secret management
- Logs
-
Query manager
- Workspace location
- Command line parameters
-
Session manager
- Deployment options
- CloudBeaver Editions
- FAQ
- Development
sm: { enableBruteForceProtection: "${CLOUDBEAVER_BRUTE_FORCE_PROTECTION_ENABLED:true}", expiredAuthAttemptInfoTtl: "${CLOUDBEAVER_EXPIRED_AUTH_ATTEMPT_INFO_TTL:60}", maxFailedLogin: "${CLOUDBEAVER_MAX_FAILED_LOGINS:10}", minimumLoginTimeout: "${CLOUDBEAVER_MINIMUM_LOGIN_TIMEOUT:1}", blockLoginPeriod: "${CLOUDBEAVER_BLOCK_PERIOD:300}", connectionBruteForce: { enabled: "${CLOUDBEAVER_CONNECTION_BF_PROTECTION_ENABLED:false}", maxFailedConnectAttempts: "${CLOUDBEAVER_CONNECTION_BF_PROTECTION_MAX_ATTEMPTS:5}", errorAttemptsPeriodInMinutes: "${CLOUDBEAVER_CONNECTION_BF_PROTECTION_ERROR_ATTEMPTS_PERIOD:1440}", blockTimeInMinutes: "${CLOUDBEAVER_CONNECTION_BF_BLOCK_PERIOD:60}" }, passwordPolicy: { minLength: "${CLOUDBEAVER_POLICY_MIN_LENGTH:8}", requireMixedCase: "${CLOUDBEAVER_POLICY_REQUIRE_MIXED_CASE:true}", minNumberCount: "${CLOUDBEAVER_POLICY_MIN_NUMBER_COUNT:1}", minSymbolCount: "${CLOUDBEAVER_POLICY_MIN_SYMBOL_COUNT:0}" } }