Database Configuration
- Postgres
- Cockroach (Zitadel v2)
ZITADEL with Postgres​
PostgreSQL is the default database for ZITADEL due to its reliability, robustness, and adherence to SQL standards. It is well-suited for handling the complex data requirements of an identity management system.
If you are using Zitadel v2 and want to use a PostgreSQL database you can overwrite the default configuration.
Currently versions >= 14 are supported.
Postgres can be configured as follows:
Database:
postgres:
Host: localhost
Port: 5432
Database: zitadel
MaxOpenConns: 15
MaxIdleConns: 10
MaxConnLifetime: 1h
MaxConnIdleTime: 5m
Options:
User:
Username: zitadel
Password: zitadel
SSL:
Mode: disable
RootCert:
Cert:
Key:
Admin:
Username: postgres
Password: postgres
SSL:
Mode: disable
RootCert:
Cert:
Key:
The admin user is only needed for the installation step but can also be avoided by preparing the necessary requirements:
- the zitadel user
- the zitadel database
- granting required permissions to the zitadel user
CREATE ROLE zitadel LOGIN;
CREATE DATABASE zitadel;
GRANT CONNECT, CREATE ON DATABASE zitadel TO zitadel;
Don't forget to adjust pg_hba.conf
and set a password for the zitadel user.
With the setup done, follow the phases guide to run the init and then setup phase to get all necessary tables and data set up.
Zitadel v2 with Cockroach​
Zitadel v3 removed CockroachDB support. See the CLI mirror guide for migrating to PostgreSQL.
The default database of Zitadel v2 is CockroachDB. The SQL database provides a bunch of features like horizontal scalability, data regionality and many more.
Currently versions >= 25.1 are supported.
The default configuration of the database looks like this:
Database:
cockroach:
Host: localhost
Port: 26257
Database: zitadel
MaxOpenConns: 20
MaxConnLifetime: 30m
MaxConnIdleTime: 30m
Options: ""
User:
Username: zitadel
Password: ""
SSL:
Mode: disable
RootCert: ""
Cert: ""
Key: ""
Admin:
Username: root
Password: ""
SSL:
Mode: disable
RootCert: ""
Cert: ""
Key: ""
Zitadel credentials​
The init phase of Zitadel creates a the zitadel user (Database.*.User.Username
& Database.*.User.Password
) with their password if it does not exist (and Admin credentials are passed). It is though to note that it does neither update nor deprecate them. In case you provisioned a Zitadel setup with insecure or easy-to-guess values you should first of all rotate them but also manually ensure, that the old role/user gets deprecated.
If you rotate the credentials you either must opt for a new username or deprecate the old user first (might lead to interruptions) since the init phase will fail if the user already exists but only the password changes. To deprecate the old user you need admin access to your database server and remove the user with commands matching your database provider.
Recreating a database will not necessarily remove the user, make sure to check for the user and remove it if necessary.