Skip to main content
Master the key concepts behind Formal’s infrastructure security platform. Terms are organized from basic to advanced.

Getting Started

Connector

Security gateway that protects your infrastructure The Connector sits between identities (employees, ai agents…) and your databases, APIs, Kubernetes clusters, and other resources. It intercepts every connection, enforces access policies, logs all activity, and can mask sensitive data—without requiring changes to your applications. Also known as: Proxy Related: Resource, Listener, Space

Resource

Any system protected by Formal A Resource is any infrastructure you want to secure: PostgreSQL databases, MongoDB clusters, Snowflake warehouses, SSH servers, Kubernetes pods, APIs, and more. Resources are accessed through the Connector, which enforces policies and logs all activity. Examples: Production database, staging API, Kubernetes cluster Related: Connector, Native User

Policy

Rules that control who can access what Policies are security rules that the Connector evaluates for every connection and query. They determine who can connect, what data they can see, which queries they can run, and whether to mask sensitive information. Policies are written in Rego, a purpose-built policy language. Examples: “Engineers can only read from dev databases”, “Mask SSNs for support team” Related: Rego, Policy Stage, Masking

Session

A recorded connection to a resource A Session is a logged connection from a user through the Connector to a Resource. Sessions capture all queries, commands, responses, and metadata, providing a complete audit trail for compliance and security investigations. Also known as: Connection, Access Session Related: Audit Log, Session Recording

Deployment & Architecture

Space

Isolated environment for your resources A Space is a logical grouping of Connectors, Satellites, and Resources that can securely communicate with each other. Spaces provide network isolation and organizational boundaries—think of them like separate environments (production, staging) or teams. Also known as: Environment, Deployment Zone Related: Connector, Satellite

Satellite

Optional add-on for advanced features A Satellite is an application deployed alongside Connectors to enable advanced capabilities like automatic PII detection, data discovery, and schema scanning. Satellites help you classify sensitive data and maintain an up-to-date inventory of your resources. Also known as: Data Scanner, Add-on Service Related: Data Label, PII Detection

Listener

Port configuration for routing connections A Listener is a configuration on the Connector that accepts connections on a specific port and routes them to designated Resources. Listeners enable a single Connector to handle multiple protocols (PostgreSQL, MongoDB, SSH) simultaneously. Also known as: Port Configuration, Connection Rule Related: Connector, Protocol Detection

Control Plane

Management console for Formal The Control Plane is Formal’s management interface where you configure policies, manage users, view sessions, and monitor your infrastructure. It’s completely separate from your data—the Control Plane never sees or stores your actual data. Also known as: Management Console, Dashboard Related: Data Plane, Connector

Data Plane

Where your data flows The Data Plane consists of your Connectors, which handle actual data traffic. All database queries and API requests flow through the Data Plane, not the Control Plane. This separation ensures Formal never has access to your data. Also known as: Data Gateway, Traffic Layer Related: Control Plane, Connector

Access & Authentication

Native User

Credential used to connect to resources A Native User is the actual credential (username/password, IAM role, or certificate) that the Connector uses to authenticate to a Resource on behalf of end users. Native Users can be static credentials, cloud IAM roles, or dynamically generated temporary credentials. Also known as: Database Credential, Resource Credential, Service Account Related: Dynamic Secrets, End-user Identity

End-user Identity

Tracking who’s actually making requests End-user Identity is the process of identifying the real person behind a connection, even when they’re using tools like Metabase, Retool, or other applications. Formal extracts user information from application parameters to attribute all queries to specific individuals. Also known as: Identity Propagation, User Attribution Related: Native User, Session

Just-in-Time Access

Temporary access granted on request Just-in-Time (JIT) Access means users request temporary permissions that expire after a set time period. Instead of permanent access, engineers can request 2-hour database access that automatically revokes, reducing the risk of compromised credentials. Also known as: Temporary Access, Time-bound Access Related: Approval Workflow, Break Glass

Dynamic Secrets

Temporary credentials that auto-expire Dynamic Secrets are short-lived credentials automatically generated for each connection and revoked when the session ends. This eliminates the risk of long-lived passwords being leaked or compromised. Also known as: Temporary Credentials, Ephemeral Secrets Related: Native User, Just-in-Time Access

MFA (Multi-Factor Authentication)

Two-step verification for high-risk access MFA requires users to provide a second form of authentication (like a code from their phone) in addition to their password. Formal can enforce MFA for specific resources, time periods, or query types. Also known as: Two-Factor Authentication, 2FA Related: SSO, Policy

SSO (Single Sign-On)

Log in once, access everything SSO allows users to authenticate through your company’s identity provider (Okta, Azure AD, Google) instead of managing separate Formal credentials. Once logged in, users can access all permitted resources without additional logins. Also known as: SAML, Identity Federation Related: Directory Sync, MFA

Policies & Rules

Rego

Policy language for writing access rules Rego is the language used to write Formal policies. It’s designed specifically for access control and uses a JSON-like syntax. Rego policies evaluate user attributes, query patterns, and context to make allow/deny/mask decisions. Also known as: Policy Language Related: Policy, OPA

OPA (Open Policy Agent)

Engine that executes policy decisions OPA is the open-source policy engine that powers Formal’s policy evaluation. It reads Rego policies and evaluates them in real-time for every connection and query, making access decisions in milliseconds. Also known as: Policy Engine Related: Rego, Policy

Policy Stage

When a policy is evaluated Policies can run at three stages:
  • Connection Time: When a user first connects (check credentials, enforce MFA)
  • Before Query: Before a query executes (block unauthorized queries)
  • After Query: After query execution (mask sensitive data in results)
Related: Policy, Masking

Policy Data Loader

Connect external data to policies A Policy Data Loader is custom code that fetches data from external systems (HR databases, ticketing systems, APIs) and makes it available to policies. This enables dynamic decisions like “allow if user is on-call” or “deny if user has open security tickets.” Also known as: External Data Connector, Policy Data Source Related: Policy, Rego

Masking

Hide sensitive data in query results Masking is the process of replacing sensitive data with obfuscated values. Formal can mask data in real-time as query results flow through the Connector, showing “XXX-XX-1234” instead of full social security numbers. Masking Types:
  • Redaction: Replace with fixed characters (***)
  • Partial Redaction: Show first/last characters (joh***@example.com)
  • Hashing: One-way encryption (always same output for same input)
  • Random: Replace with realistic fake data
Also known as: Redaction, Data Obfuscation Related: Policy, PII, Data Label

Data Governance

Data Label

Automatically detected sensitive data Data Labels are PII entities automatically identified by Satellites scanning your databases. They tag columns containing emails, phone numbers, SSNs, credit cards, and other sensitive data, making it easy to write policies that protect all PII without manually cataloging every column. Also known as: Sensitivity Tag, Data Classification Related: Tags, PII, Satellite

Tags

Custom labels for organizing data Tags are user-defined labels you attach to database columns for organization, search, and discovery. Unlike Data Labels (which are auto-detected), Tags are manually created to track business context like “customer_data”, “finance”, or “deprecated”. Related: Data Label

PII (Personally Identifiable Information)

Personal data that identifies individuals PII is any data that can identify a specific person: names, email addresses, social security numbers, phone numbers, IP addresses, etc. Formal’s Satellites automatically detect PII in your databases and help you mask or restrict access to it. Examples: Email, SSN, Credit Card, Phone Number, Home Address Related: Data Label, Masking, Satellite

Logging & Compliance

Audit Log

Tamper-proof record of all activity Audit Logs capture every connection, query, policy decision, and system action within Formal. They’re cryptographically secured to prevent tampering and provide evidence for compliance audits (SOC 2, HIPAA, GDPR). Also known as: Activity Log, Compliance Log Related: Session, Session Recording

Session Recording

Complete capture of terminal sessions For SSH, Kubernetes, and other terminal-based resources, Formal can record the entire session including all commands typed and output displayed. This creates a video-like playback for security investigations. Also known as: Terminal Recording, Command Logging Related: Session, Audit Log

Log Encryption

Encrypt logs with your own keys Log Encryption allows you to encrypt all session logs and audit data using your own encryption keys. This ensures Formal cannot decrypt your logs without your explicit permission, even if compelled by law enforcement. Related: Encryption Key, Audit Log

Integrations

SIEM

Security monitoring and alerting platform SIEM (Security Information and Event Management) systems like Splunk, Datadog, and Sumo Logic collect and analyze security logs. Formal can stream all audit logs and policy violations to your SIEM for centralized monitoring. Also known as: Log Analysis Platform, Security Monitoring Examples: Splunk, Datadog, Sumo Logic Related: Audit Log

Cloud Integration

Automatic discovery of cloud resources Cloud Integrations connect Formal to your AWS, GCP, or Azure account to automatically discover databases, Kubernetes clusters, and other resources. This eliminates manual configuration and keeps your inventory up-to-date as infrastructure changes. Also known as: Auto-Discovery, Cloud Connector Related: Resource, Satellite

Directory Sync

Automatically sync users from identity providers Directory Sync (SCIM) automatically imports users and groups from identity providers like Okta, Azure AD, or Google Workspace. As employees join, change roles, or leave, their Formal access updates automatically. Also known as: SCIM, User Provisioning Related: SSO, Groups

Advanced Concepts

Protocol Detection

Automatic identification of database types Protocol Detection allows the Connector to automatically identify what type of connection it’s receiving (PostgreSQL, MongoDB, MySQL, etc.) without manual configuration. This enables “smart routing” where a single port can handle multiple database types. Also known as: Smart Routing, Wire Protocol Detection Related: Listener, Connector

Break Glass Access

Emergency access with full audit trail Break Glass is a mechanism for granting immediate emergency access during incidents, bypassing normal approval workflows. All break glass access is heavily logged and triggers alerts, providing accountability during emergencies. Also known as: Emergency Access Related: Just-in-Time Access, Approval Workflow

Approval Workflow

Multi-step access requests Approval Workflows define who must approve access requests before they’re granted. You can configure multi-stage approvals (manager → security team → DBA) with time limits and escalation rules. Also known as: Access Request, Approval Chain Related: Just-in-Time Access, Slack Integration