- AWS-level authentication — how 4MINDS discovers which RDS instances exist in your account. Uses IAM Role Federation (recommended) or Amazon Cognito, both shared with the rest of 4MINDS’s AWS integrations.
- Database-level authentication — the RDS master username and password for the specific instance you want to browse. Provided per-session, cached only in your browser, and never persisted on the 4MINDS server.
Supported Database Engines
4MINDS supports database browsing on these RDS engines:| Engine family | RDS Engine values |
|---|---|
| PostgreSQL | postgres, aurora-postgresql |
| MySQL / MariaDB | mysql, mariadb, aurora-mysql, aurora |
RDS IAM Permissions Policy
Whichever AWS auth method you use (IAM Role Federation or Cognito), attach this policy to the role:| Permission | Purpose |
|---|---|
rds:DescribeDBInstances | Lists RDS instances in the connected region so 4MINDS can populate the instance picker |
sts:GetCallerIdentity | Verifies the connection during Test Connection |
4MINDS-RDS-Access — you’ll attach it when creating the IAM role (for Role Federation) or the Cognito authenticated role.
Note: This policy only grants 4MINDS the ability to discover RDS instances. 4MINDS never uses IAM to query inside a database — actual SQL access happens over a direct database connection using the master credentials you supply in the browser.
Least-Privilege: Restricting to Specific Instances
If you want to expose only a subset of your RDS fleet, scoperds:DescribeDBInstances by ARN:
Connection Method 1: IAM Role Federation (Recommended)
Short-lived credentials minted per request through AWS STS — no long-lived AWS keys stored in 4MINDS.- Complete the one-time AWS setup in AWS Integrations → IAM Role Federation (OIDC provider + IAM role with trust policy).
- Attach the RDS IAM policy above to the role (Role Federation and Cognito can share the same role — just attach both service policies to it if you use multiple AWS integrations).
- In 4MINDS, open Integrations → Amazon RDS → click Configure (or Settings if already connected).
- Keep the IAM Role tab selected.
- Paste your IAM Role ARN (e.g.,
arn:aws:iam::123456789012:role/4MINDS-integration-role). - (Optional) If your trust policy includes an
sts:ExternalIdcondition, enter the External ID. - Enter your AWS Region (e.g.,
us-east-1) — this must match the region of the RDS instances you want to browse. - Click Test Connection — success shows “Connection successful! Found N instance(s).”
- Click Save Credentials.
Connection Method 2: Amazon Cognito
Use this if your organization already authenticates against AWS through Cognito User Pools and Identity Pools.- Complete the one-time Cognito setup in AWS Integrations → Amazon Cognito (User Pool, App Client, Identity Pool, authenticated role).
- Attach the RDS IAM policy above to the Cognito authenticated role.
- In 4MINDS, open Integrations → Amazon RDS → click Configure.
- Switch to the Cognito tab.
- Fill in User Pool ID, App Client ID, App Client Secret (if configured), Identity Pool ID, Username, and Password.
- Enter your AWS Region.
- Click Test Connection, then Save Credentials.
4MINDS Fields
| Field | Required | Notes |
|---|---|---|
| AWS Region | Yes | Region where your RDS instances are deployed. Must match the region of your Cognito resources (Cognito method) |
| IAM Role ARN | IAM Role method | Role with the RDS IAM policy attached |
| External ID | No | Only if your trust policy enforces sts:ExternalId |
| Cognito fields | Cognito method | See AWS Integrations |
Importing Data from RDS
Once connected, open the Datasets page and click Add Source → Amazon RDS (or pick RDS from the data source bar inside an existing dataset). The import wizard walks you through four steps:Step 1 — Pick an Instance
4MINDS callsrds:DescribeDBInstances in your configured region and shows every instance the role can see, with its engine, engine version, instance class, and status. Use the search box to filter by identifier or engine. Click an instance to continue.
Instances not in the available state are shown with a warning color and may fail to connect in Step 2.
Step 2 — Enter Master Credentials
The first time you open a given instance in a browser session, 4MINDS prompts for the master DB username and master DB password. These are the credentials you set when creating the RDS instance (e.g.,postgres / admin).
- Credentials are sent in the POST body of each SQL call (
list databases,list tables,preview). - They are cached in
sessionStoragefor the current browser tab so you don’t have to re-enter them when navigating between instances and databases in the same session. - They are never written to the 4MINDS database — the cache clears automatically when the tab closes.
- If a call fails with an auth error, the cache for that instance is invalidated and you’re sent back to the credentials prompt.
Step 3 — Browse Databases
4MINDS opens a live SQL connection to the instance endpoint using your master credentials and lists user databases. System databases (rdsadmin, mysql, information_schema, performance_schema, sys) are filtered out.
Step 4 — Select Tables
Click a database to list its base tables. For each table the browser shows:- Schema-qualified name (e.g.,
public.customersfor Postgres, or justordersfor MySQL) - Estimated row count (from
pg_stat_user_tables/information_schema.tables) - Column count
- On-disk size
During Import
At import time, 4MINDS runs a bulk fetch on each selected table:- Up to 50,000 rows per table (hard cap — larger tables are truncated and flagged).
- Binary columns (
BYTEA,BLOB,VARBINARY, etc.) are dropped from the export rather than base64-encoded, to keep CSV output reasonable. - Complex types (JSONB, arrays) are serialized with
json.dumpsinto a single cell. - Timeout is 120 seconds per table.
Networking Requirements
RDS instances live inside a VPC. For 4MINDS to open a SQL connection, the instance must be reachable from the 4MINDS backend’s outbound network:- Security group inbound rule — allow the database port (5432 for Postgres, 3306 for MySQL/MariaDB) from the 4MINDS backend’s public IP or the CIDR range of its egress.
- Publicly accessible = Yes is the simplest path for temporary testing; for production, prefer a VPC peering / PrivateLink setup with 4MINDS support.
- SSL — Postgres instances are contacted with
sslmode=prefer(tries TLS, falls back gracefully). MySQL uses the driver default.
“Connection timed out. The backend may not be able to reach the RDS endpoint — check VPC / security group rules (inbound port open from the backend’s network).”
Security Model
| Credential | Where it lives | How long |
|---|---|---|
| AWS IAM Role ARN / Cognito config | 4MINDS database (encrypted metadata) | Until you disconnect |
| Temporary AWS credentials (STS) | Request memory only | ~1 hour, minted per call |
| RDS master username / password | Browser sessionStorage only | Until the browser tab closes |
/instances/{id}/databases, /tables, /preview) takes the credentials in its request body, opens a short-lived SQLAlchemy engine, runs one query, and disposes of the engine before returning.
Testing Your Connection
After saving credentials, the Test Connection button:- Resolves your auth method → AWS credentials (via STS AssumeRoleWithWebIdentity for Role Federation, or Cognito GetCredentialsForIdentity for Cognito).
- Calls
rds:DescribeDBInstanceswith a 15-second timeout. - Returns “Connection successful! Found N instance(s).” on success.
Troubleshooting
| Issue | Solution |
|---|---|
AccessDenied on Test Connection | The IAM policy isn’t attached to the role, or is missing rds:DescribeDBInstances |
Invalid Access Key ID / Invalid Secret Access Key | Wrong static credentials (only relevant if using legacy access-keys auth) |
Unrecognized client | Wrong AWS region, or RDS isn’t enabled in that region |
Could not resolve RDS endpoint hostname | The instance endpoint in the instance list is wrong, or DNS can’t resolve it from the backend |
Connection timed out (SQL step) | Security group doesn’t allow inbound from the 4MINDS backend’s egress IP/CIDR |
Connection refused | Port isn’t open on the security group, or the instance isn’t Publicly accessible and there’s no peering |
Authentication failed. Check the master username and password. | Wrong RDS master credentials — the sessionStorage cache is cleared automatically so you’ll be re-prompted |
SSL error connecting to RDS | Rare — some older Postgres instances reject sslmode=prefer. Contact 4MINDS support to tune the connection string |
RDS engine 'oracle-ee' is not supported | Database browsing only works on Postgres / MySQL / MariaDB / Aurora variants. See Supported Database Engines |
| Tables list is empty | The database has no base tables, or the master user lacks SELECT on information_schema / pg_stat_user_tables |
Disconnecting
To remove the RDS integration:- Open Integrations → Amazon RDS → click Settings.
- Click Disconnect.
sessionStorage are cleared automatically when you close the browser tab, or you can clear them manually via the browser’s developer tools (Application → Storage → Session Storage).
