All Products
Search
Document Center

Data Management:Register a database hosted on a third-party cloud service or a self-managed database

Last Updated:Mar 28, 2026

Connect a self-managed database or a database hosted on a third-party cloud service to Data Management (DMS) for centralized access control, SQL execution, and governance.

Prerequisites

Before you begin, make sure that:

Register a database instance

The following example registers a MySQL database accessible over the Internet. The steps apply to all supported database types and network modes — adjust the Instance Source and related fields to match your setup.

  1. Log on to the DMS console V5.0.

  2. In the left-side navigation pane, click the add icon next to Database Instances.

    Alternatively, choose Data Assets > Instances in the top navigation bar. On the Instance List tab, click New.
  3. In the Add Instance dialog box, set Data Source to Third-party Cloud/Self-managed, then configure the following parameters. Advanced Feature Pack The Advanced Feature Pack parameter sets the control mode and optional data protection features for this instance. The following parameters appear based on your Advanced Feature Pack selection:

    • Security Rules — appears when Security Collaboration is selected. Select default or custom security rules for fine-grained control. See Manage security rules.

    • Data Classification Template — appears when Sensitive Data Protection is selected. Bind a classification template to identify and label sensitive fields. See Manage DMS classification and grading templates.

    If you use Internet access, add the IP addresses used to access the database to your database whitelist to limit exposure to attacks.
    If the instance source is Database Gateway or VPC PrivateLink, set up the required network resources before starting registration.
    If you select neither Security Collaboration nor Stable Change, the instance is managed in Flexible Management mode by default.
    Do not add spaces or special characters before or after any field value.

    Basic information

    ParameterDescriptionApplies when
    Database TypeThe database engine typeAll instance sources
    Instance SourceThe network access mode. Options: Internet, ECS-hosted self-managed instance, Database Gateway, VPC PrivateLink, Open Source MyBase DatabaseAll instances
    Instance RegionThe region where the database residesAll instances
    Login AddressThe connection target. See the table below for values by instance source.Depends on instance source
    PortThe port used to connect to the databaseAll instances
    Database AccountThe account used to log on to the database. The account must have the permissions needed for the operations you plan to perform in DMS. We recommend creating a dedicated account for DMS rather than using a shared account.All instances
    Database PasswordThe password for the database accountAll instances
    Secure hostingControls how DMS authenticates to the database. Enable (recommended): DMS manages credentials and supports permission control at the instance, database, table, and row levels. Disable: DMS requires a database account and password each time a session times out, which may interrupt workflows. We recommend that you do not set the Security hosting parameter to Disable. See Security hosting.All instances

    Login Address by instance source

    Instance sourceWhat to enter
    InternetThe IP address of the database
    ECS-hosted self-managed instanceThe ID of the ECS instance
    Database GatewayThe ID and endpoint of the Database Gateway. See Create a database gateway.
    VPC PrivateLinkThe ID and endpoint of the VPC. See Connect a data center to a VPC.
    Open Source MyBase DatabaseThe ID of the MyBase on ACK instance and the ID of the MyBase on ACK cluster. Only MyBase on ACK instances are supported.
    OptionDescription
    Security CollaborationIncludes all Stable Change features plus the DevOps feature for customizing R&D and approval workflows. See Control modes.
    Stable ChangeProvides solutions for stable database operations, including lock-free changes and SQL review. Cannot be selected together with Security Collaboration.
    Sensitive Data ProtectionEnables masking and access control for sensitive data. See Enable the sensitive data protection feature.

    Advanced information

    ParameterDescriptionApplies when
    Environment TypeThe environment type of the instance (for example, production or development). See Environment types.All instances
    Instance NameA display name for the instance in DMS. If registering for the first time, the database name syncs to DMS automatically. See Modify database instances.All instances
    Lock-free Schema ChangeControls the Online DDL method. Options: Enable (DMS OnlineDDL First), Enable (MySQL Native OnlineDDL First), Close. See Enable the lock-free schema change feature.MySQL instances only
    Enable SSLEncrypts the connection at the transport layer, improving data security in transit. Enabling SSL increases network response time. Make sure SSL is enabled on the database instance before setting this to Enable.MySQL and Redis instances only
    DBAThe database administrator (DBA) for this instance. The DBA can grant permissions to other DMS users.All instances
    Query Timeout(s)The maximum time allowed for an SQL query to run. Queries exceeding this limit are terminated.All instances
    Export Timeout(s)The maximum time allowed for an SQL export operation. Exports exceeding this limit are terminated.All instances
  4. Click Test Connection in the lower-left corner. If the connection test fails, check the error message and verify the instance information, such as the IP address, port, and account credentials.

  5. After the connection test passes, click Submit.

The database instance is now registered with DMS. View and manage it in the left-side database instance list of the DMS console.

Permissions required for DMS users

To allow DMS users to manage the registered instance, grant them permissions based on their management scope:

Management scopeRequired permissions
All databases on an instancePermissions on all databases
Specific databases on an instancePermissions on those databases only
DML operations (insert, delete, update, query) and schema changesDML permissions
Views, stored procedures, triggers, and functionsObject-level permissions for each object type

For the syntax to grant permissions, see the official documentation for your database engine.

What's next

After registering a database instance, you can:

Troubleshooting

Connection test fails for Azure SQL Database

If the DMS server IP is whitelisted in Azure SQL Database but the connection test still fails, the Database Account field requires a specific format.

Enter <database account>@<server name> in the Database Account field. For example, if the public endpoint is testservername.testdatabase.windows.net and the account is testuser, enter testuser@testservername.

Instance defaults to Flexible Management mode

If you did not select Security Collaboration or Stable Change in Advanced Feature Pack during registration, the instance is managed in Flexible Management mode. This is expected behavior.