Advanced Connection Settings

Learn how to configure secure connections using SSL/TLS, SSH Tunnel, and Proxy, as well as Connection Properties and Renamer settings.

SSL/TLS Connection

Encrypt communication with the database for a secure connection. Enable the SSL/TLS toggle on the SSL/SSH tab of the connection settings to display the configuration panel.

FieldDescription
ModeSSL connection level. Choose from disable, prefer, require, verify-ca, verify-full.
CA CertificateCA certificate file for verifying the server certificate. Supports .pem, .crt, .cer formats.
Client CertificateUsed when the server requires client authentication. Click the upload button to select a file.
Client KeyPrivate key file corresponding to the client certificate.
Client Key PasswordEnter the password if the client key file is encrypted.
Server Certificate VerificationWhether to verify the validity of the certificate presented by the server. Recommended to enable in production.
Allow Public Key RetrievalAllow automatic retrieval of public key from server for MySQL/MariaDB caching_sha2_password authentication.

SSL Mode Behavior

ModeEncryptionServer Cert VerificationDescription
disableNoneNoneSSL is not used.
preferIf possibleNoneUses SSL if the server supports it, otherwise connects without encryption.
requireRequiredNoneAlways uses encrypted connection, but does not verify the server certificate.
verify-caRequiredCA onlyVerifies that the server certificate was issued by a trusted CA.
verify-fullRequiredCA + HostnameIn addition to CA verification, verifies that the certificate hostname matches the actual server.
Tip

When connecting to cloud DBs such as AWS RDS, download the CA certificate from the cloud provider and upload it to the CA certificate field.

SSH Tunnel Connection

Securely connect to databases not directly accessible from outside via SSH tunnel. Enable the SSH Tunnel toggle to display the configuration panel.

SSH Server Info

FieldDescriptionDefault
HostSSH server (Bastion Host) address-
PortSSH service port22
UserSSH login account-

Authentication Method

Choose one of two authentication methods:

  • Password — Enter the SSH account password directly.
  • Public Key — Upload an SSH private key file (.pem). Enter the passphrase if one is set on the key file.

Port Forwarding

Port forwarding settings for the SSH tunnel. Generally, default values work fine.

FieldDescriptionDefault
Local HostLocal binding address127.0.0.1
Local PortLocal binding port (0 for auto-assign)0
Remote HostDB host accessible from the SSH server (uses connection host if empty)-
Remote PortDB port accessible from the SSH server (uses connection port if 0)0

Advanced Settings

FieldDescriptionDefault
Keep-Alive (sec)Packet interval to keep SSH connection alive (0 to disable)0
Timeout (sec)SSH connection timeout30
Host Key VerificationWhether to verify the SSH server's host key (Strict Host Key Checking)Disabled
Tip

When connecting to cloud DBs like AWS RDS, use a Bastion Host as an SSH tunnel to maintain security. Enter the RDS endpoint as the remote host and the DB port as the remote port.

Proxy Connection

Connect to the database through a proxy server. Enable the Proxy toggle to display the configuration panel.

FieldDescriptionDefault
TypeProxy protocol: SOCKS5, SOCKS4, HTTPSOCKS5
HostProxy server address-
PortProxy server port1080
UserUsername if proxy authentication is required-
PasswordPassword if proxy authentication is required-

Connection Properties

Specify additional properties for the JDBC connection in key-value format. Configure in the Properties tab of the connection settings.

Enter a key and value in the input fields, then click the ADD button to add a property. Added properties are shown in the list below and can be individually deleted.

Usage Examples

keyvalueDescription
connectTimeout10000Connection timeout (milliseconds)
useUnicodetrueEnable Unicode support
characterEncodingutf8mb4Character encoding setting
serverTimezoneAsia/SeoulServer timezone setting

Note: Default connection properties for each DBMS are automatically applied. Properties specified here override the defaults. Refer to each JDBC driver's documentation for available properties.

Renamer

Set up rules to automatically convert table and column names during Reverse Engineering (DB -> ERD). Configure in the Renamer tab of the connection settings.

Table Renamer and Column Renamer can be configured independently. When multiple rules are added to each Renamer, they are applied sequentially in list order.

Renamer Types

regexp (Regular Expression)

Use regular expressions to find and replace specific patterns in names.

FieldDescription
regexpPattern to find (JavaScript regular expression)
replaceReplacement string (leave empty to remove the matched part)

Example: Remove table name prefix

  • regexp: /^[^_]*_/, replace: (empty)
  • TBL_USER -> USER, TB_ORDER_ITEM -> ORDER_ITEM
case-format (Case Conversion)

Convert the case format of names.

FormatExampleDescription
SNAKEorder_itemLowercase + underscore
SNAKE_UPPERORDER_ITEMUppercase + underscore
CAMELorderItemcamelCase (first letter lowercase)
CAMEL_UPPEROrderItemPascalCase (first letter uppercase)

Usage Example

If the DB table name is TBL_ORDER_ITEM and you want to display OrderItem in the ERD:

  1. Add a regexp rule to Table Renamer: regexp /^[^_]*_/, replace (empty) -> ORDER_ITEM
  2. Add a case-format rule to Table Renamer: CAMEL_UPPER -> OrderItem

Rules are applied from top to bottom, and you can change the order using the arrow buttons in the list.

Note: Renamer is only applied during Reverse Engineering. In Forward Engineering (ERD -> DB), the names displayed in the ERD are used as-is.