Bridge
Use case for Bridge: Connect with remote databases using Bridge
Most organizations secure their remote databases using firewalls. If you are looking for a way to navigate these firewalls to access remote databases, Bridge can be of help. Let us try to solve a real-time business case where Bridge is used to ...
Credentials
Most databases are secured with credentials to ensure secure access and user authentication while logging in. Credential types vary with databases. Organizations using more than one database might find it difficult to authenticate using the ...
Connectors
Connectors automate database connections between Qntrl and external databases. Connectors hold all the details required to initiate a session with the external database. Connectors require a Bridge to communicate with remote machines. If a user ...
Other actions in Bridge
View Bridge properties Once you create a Bridge, you can view its properties. Navigate to and select Bridge under Advanced. Select the Bridge you want to view. You can edit the properties of Bridge. Under Modules tab, choose the modules you want ...
Bridge settings
View Bridge configuration Once the Bridge is set up you will be able to view the Configuration under Settings. Bridge Configuration displays details such as org name, bridge name, registration key, and polling interval. Client Details encompass ...
Configure Bridge agent
Step 1: Set up Bridge Setting up Bridge for Mac/Linux Once the Bridge file is downloaded as in the previous step, save it in a new directory and open your Terminal. In the terminal, unzip the downloaded file in a new directory by typing the ...
Configure Bridge in Qntrl
The following is a step-by-step document to configure and use Bridge in Qntrl. Step 1: Create Bridge Qntrl allows you to create any number of Bridges. Navigate to and select Bridge under Advanced. Click the New Bridge button. Enter the bridge ...
What is a Bridge?
Bridge is a secure connection between Qntrl and the customer’s application, where Qntrl creates an agent to communicate with the application’s server via messages to access allowed data. The level of data access for each Bridge can be completely ...