Table of Contents
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
Note
: This feature is available in Lite, Enterprise, and Ultimate editions only.
Table of contents
DBeaver comes with Microsoft Entra ID (formerly Azure AD) authentication support, allowing secure access to your databases.
The official Entra documentation.
Prerequisites
Make sure you have:
- an active Azure account with the appropriate permissions
- a Microsoft Entra ID application is registered and configured by your administrator.
For more details on permissions, see Azure permissions.
Microsoft Entra ID configuration
To enable authorization with the Microsoft platform, you need a registered application in Azure. If one doesn't exist, create and configure it as follows:
-
Register an application
Create a new enterprise application in Microsoft Entra by following the steps in the official Microsoft documentation. -
Configure application secrets DBeaver uses the OpenID Connect protocol for authorization with Microsoft Entra ID. To enable this, configure application secrets. Detailed instructions are available in the official Microsoft documentation.
Important: Record the value of the client secret immediately after creating it. It can only be viewed once. If you miss this step, you’ll need to create a new secret.
Configure an authentication type
Default credentials
Use this when you do not want to store secrets in DBeaver.
-
Open Edit connection.
-
On Connection settings, set Credentials to Default credentials.
-
(Optional) If database access is granted through an Entra ID group, enter the AD Group name.
-
(Optional) Review Use legacy token permissions.
- keep it unchecked in almost all cases
- enable it only if your DBA or admin specifically instructs you
This option forces the connection to use older token scopes and claim formats for backward compatibility with databases or drivers that don’t fully support modern Microsoft Entra ID permissions.
-
Click Test connection, then Save.
Tip: To see how DefaultAzureCredential picks a provider, see DefaultAzureCredential overview.
Environment variables
Set these before starting DBeaver if you want to guide how the SDK gets a token.
-
If you use the environment-variable credential
AZURE_CLIENT_ID— your app’s client IDAZURE_TENANT_ID— your Microsoft Entra directory (tenant) ID- then either:
AZURE_CLIENT_SECRET, orAZURE_CLIENT_CERTIFICATE_PATHandAZURE_CLIENT_CERTIFICATE_PASSWORD(optional, for.pfx)
-
If you use managed identity
- for a user-assigned identity:
AZURE_CLIENT_ID - for a system-assigned identity: no variables are required
- (available only in Azure environments like VM, App Service, or Function App)
- for a user-assigned identity:
macOS
launchctl setenv AZURE_CLIENT_ID <value>
launchctl setenv AZURE_TENANT_ID <value>
# optional
launchctl setenv AZURE_CLIENT_SECRET <value>
launchctl setenv AZURE_CLIENT_CERTIFICATE_PATH /path/to/cert.pfx
launchctl setenv AZURE_CLIENT_CERTIFICATE_PASSWORD <value>
Tip: Restart DBeaver (or log out and back in) after running these commands. Variables set with
launchctlare visible only to new GUI apps.
Linux
export AZURE_CLIENT_ID=<value>
export AZURE_TENANT_ID=<value>
# optional
export AZURE_CLIENT_SECRET=<value>
export AZURE_CLIENT_CERTIFICATE_PATH=/path/to/cert.pfx
export AZURE_CLIENT_CERTIFICATE_PASSWORD=<value>
Tip: These variables work only in the current terminal session. Add them to
~/.bashrcor~/.profileto make them persistent when is launched from the desktop.
Windows
Set variables as User variables in System Properties - Environment Variables, then restart DBeaver.
Or set them from PowerShell:
setx AZURE_CLIENT_ID "<value>"
setx AZURE_TENANT_ID "<value>"
# optional
setx AZURE_CLIENT_SECRET "<value>"
setx AZURE_CLIENT_CERTIFICATE_PATH "C:\path\to\cert.pfx"
setx AZURE_CLIENT_CERTIFICATE_PASSWORD "<value>"
Enterprise application
Use this for user sign-in without storing a secret in DBeaver.
-
Open Edit connection.
-
Set Credentials to Enterprise application.
-
Enter the values below:
Field in DBeaver What to enter Where to find in the Azure portal Reference Client ID Your application’s Application (client) ID Microsoft Entra ID - App registrations - Your app - Overview Copy the application ID (client ID) Tenant ID Your Directory (tenant) ID Microsoft Entra ID - Overview - Tenant ID Find your tenant ID AD Group name (Optional) The exact Entra group name that was granted database access Microsoft Entra ID - Groups - Your group - Overview Create a group and add members -
(Optional) Review Use legacy token permissions.
- keep it unchecked in almost all cases
- enable it only if your DBA or admin specifically instructs you
This option forces the connection to use older token scopes and claim formats for backward compatibility with databases or drivers that don’t fully support modern Microsoft Entra ID permissions.
-
Click Test connection, then Save.
For information on creating the application in Azure, see Register an app.
Client secret
Use this for service connections where an app authenticates with a secret.
-
Open Edit connection.
-
Set Credentials to Client secret.
-
Enter the values below:
Field in DBeaver What to enter Where to find in the Azure portal Reference Client ID Your app’s Application (client) ID Microsoft Entra ID - App registrations - Your app - Overview Copy the client ID Tenant ID Your Directory (tenant) ID Microsoft Entra ID - Overview - Tenant ID Find your tenant ID Client secret The secret Value (not the Secret ID) Your app - Certificates & secrets - Client secrets Add a client secret AD Group name (Optional) The exact Entra group name that was granted database access Microsoft Entra ID - Groups - Your group - Overview Create a group and add members -
(Optional) Review Use legacy token permissions.
- keep it unchecked in almost all cases
- enable it only if your DBA or admin specifically instructs you
This option forces the connection to use older token scopes and claim formats for backward compatibility with databases or drivers that don’t fully support modern Microsoft Entra ID permissions.
-
Click Test connection, then Save.
For information on creating the secret in Azure, see Add a client secret.
Client certificate
Use this when your org prefers certificates to secrets.
-
Open Edit connection.
-
Set Credentials to Client certificate.
-
Enter the values below:
Field in DBeaver What to enter Where to find in the Azure portal Reference Client ID Your app’s Application (client) ID Microsoft Entra ID - App registrations - Your app - Overview Copy the client ID Tenant ID Your Directory (tenant) ID Microsoft Entra ID - Overview - Tenant ID Find your tenant ID Client certificate path Local path to the private-key file You generate the cert locally and upload the public cert to Your app - Certificates & secrets - Certificates Certificate credentials Client certificate password (Optional) Password for the .pfx, if set when exportingSet during export of the .pfxon your machineCertificate credentials AD Group name (Optional) Exact group name that has database access Microsoft Entra ID - Groups - Your group - Overview Create a group and add members -
(Optional) Review Use legacy token permissions.
- keep it unchecked in almost all cases
- enable it only if your DBA or admin specifically instructs you
This option forces the connection to use older token scopes and claim formats for backward compatibility with databases or drivers that don’t fully support modern Microsoft Entra ID permissions.
-
Click Test connection, then Save.
For information on certificate credentials in Azure, see Certificate credentials.
Troubleshooting
Authentication fails
- Check that the Client ID and Tenant ID match the registered application in Azure.
- Make sure the user is assigned in the Azure portal.
- Confirm the app has the required API permissions or roles.
- Make sure required tenant-wide admin consent was granted by the user or an admin.
Group-based authentication fails
If you're using an Entra ID security group to connect to Azure Database for PostgreSQL and see an error like:
password authentication failed for user "<group-name>"
Check the following:
- The Entra ID user is a member of the group.
- The group has database access granted in PostgreSQL.
- You’re using an authentication method that supports Entra ID tokens (like Default credentials or Enterprise application).
- The access token includes group claims, and the required API permissions were granted by an admin.
- Enter the group name in the AD Group name field of the connection settings in DBeaver.
DBeaver Documentation
- Getting started
- DBeaver configuration
- Security
- Connection settings
- Databases support
- Classic
- Cloud
- Embedded
- File drivers
- Graph
- Database Navigator
- Data Editor
- SQL Editor
- Entity relation diagrams (ERD)
- Cloud services
- AI Assistant
- Data transfer and schema compare
- Task management
- Integrated tools
- Administration
- DBeaver Editions
- Standalone
- Cloud-hosted
- FAQ
- Development



