Proxy / SSH Tunnel Connection Tab
On this page
The Proxy / SSH Tunnel tab allows you to connect to your deployment with a Proxy method or SSH tunnel.
Procedure
Click the Proxy / SSH Tunnel tab.
You have the following connection options:
Option | Description |
---|---|
SSH with Password | Connects to a deployment using a SSH Tunnel and has the option to secure
the connection with a password. For information on SSH connections and
the fields for this connection option, see SSH Connection. |
SSH with Identity File | Connects to a deployment using a SSH Tunnel and uses an Identity File
to secure the connection. For information on SSH connections and
the fields for this connection option, see SSH Connection. |
Socks5 | Connects to a deployment using a seperate proxy server. For more
information on the fields for this connection option, see
Socks5. |
Application-level Proxy | Connects to a deployment using application-level proxy settings
specified in the Compass Settings panel. |
SSH Connection
To connect to a deployment using SSH with Password or SSH with Identity File, use the following fields:
Field | Description |
---|---|
SSH Hostname | Bastion (jumpbox) hostname. This is the unique identifier
(Fully Qualified Domain Name, or FQDN) for the computer to access. |
SSH Port | Port used for the SSH connection. This defaults to 22,
the standard port for SSH. |
SSH Username | This is the user for which the profile to log into on the remote
system. This is the user for which you want to establish the
SSH connection. |
SSH Password | (Optional) Password used to secure the SSH connection. This is
required if you are not using an identity file. |
SSH Identity File | File from which the identity (private key) for SSH public key authentication is read. Unix or OS X: If using OpenSSH, identity files are found in the
On Windows, the location of the identity files depends on your choice of SSH client, such as PuTTY. |
SSH Passphrase | (Optional) If your private key is encrypted, provide the passphrase
used to decrypt your private key. A passphrase provides an extra
layer of security for an SSH connection. |
Behavior
In MongoDB Compass, SSH Tunnel Connections allow users to connect to replica sets.
Users can connect to replica sets using SSH Tunnels and TLS / SSL connections.
Socks5
To connect to a deployment using Socks5, use the following fields:
Field | Description |
---|---|
Proxy Hostname | Domain name, IPv4, or IPv6 address on which a socks5 proxy is listening. |
Proxy Tunnel Port | (Optional) TCP port number. Default is 1080. |
Proxy Username | (Optional) Username used to authenticate the connection with the proxy
server. |
Proxy Password | (Optional) Password used to authenticate the connection with the
proxy server. |
Behavior
If you specify a non-local Socks5 proxy host and provide a username and password authentication, you receive a warning stating that the credentials will be sent in plaintext.
If you specify a remote Socks5 proxy host and do not enable TLS, you receive a warning stating that the proxy administrator will be able to intercept data sent and received by Compass.