Access issues when doing reverse-engineering of Couchbase

With Couchbase 3.x and 4.x fairly basic security, the Administrator can set a password at the bucket level, but anyone with that password gets full rights on the bucket.  With Couchbase 5.x a new role-based access control is introduced.  Hackolade supports security of all these versions, but special attention is required for proper configuration:

  • if N1QL service is running, we use Couchbase nodejs SDK and a combination of INFER when available (Enterprise 4.5 and above) and N1QL queries, plus:
    • v5.x: we use role-based access control 
    • v4.x: we use read-only credentials combined with bucket name/password if any 
    • v3.x: not possible as N1QL did not exist
  • if N1QL is not running, we fall back to the REST API, plus:
    • v5.x: we use RBAC credentials (specified in the Authentication tab)
    • v4.x: we use read-only credentials combined with bucket name/password if any: the bucket name/password needs to be filled in Connection tab, while the Read-Only username/password is entered in the Authentication tab.  This is required, as per:  "Couchbase requires Cluster level authentication for certain REST commands and Bucket level for others"
    • v3.x: we need the console admin name/password (specified in the Authentication tab)
Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.