Deploy secure, enterprise-grade database connectivity for AI tools with comprehensive identity management, role-based access control, and audit capabilities.
Self-installable server that connects directly to your database with enterprise-grade security
The Secure Data Access Point (SDAP) is a self-installable server that connects directly to your database. It is compatible with the Apache Arrow Flight SQL protocol which means that data is streamed efficiently throughout the Ekaya pipeline to the AI. Database permissions do not leave your premises. The user authentication token is maintained, verified and access logged all the way to the data access layer. You have full access to the source code.
High-performance protocol: Apache Arrow Flight SQL leverages the Arrow in-memory columnar format and Flight RPC framework for efficient data transfer over networks.
Native support for your existing database infrastructure
Grant IMPERSONATE permissions to the SDAP service principal on target users. No individual user credentials required.
GRANT IMPERSONATE ON USER::[user@company.com] TO [sdap-service]Why this matters: Your existing SQL Server security just works. No need to create new service accounts or manage AI-specific credentials. The SDAP uses your current user permissions - nothing more, nothing less.
Grant role membership to the SDAP service account for target users/roles.
GRANT target_user TO sdap_service_accountWhy this matters: PostgreSQL's role system becomes your AI security layer. One service account can safely impersonate any user you've granted access to. Your RLS policies and row-level security automatically apply to AI queries.
Seamless integration with your existing identity infrastructure
Connect directly with your identity providers including Active Directory, Entra ID, Okta, Ping Identity, and other enterprise solutions.
Users authenticate through your existing SSO portal. Ekaya receives identity tokens and maps them to database access permissions through JWT claims including customerUserId and databaseRole.
The magic: Zero integration work on your identity side. Your existing SAML/OIDC setup feeds directly into database permissions. No custom connectors, no API keys to manage, no new attack vectors.
Fine-grained control over who can access what data
User logs in through your SSO portal (SAML/OIDC)
Ekaya creates JWT with customerUserId and databaseRole claims from your identity provider
SDAP uses service principal to impersonate the user in your database
All queries run with the user's actual database permissions - no elevated access
Leverage your existing database roles and permissions. The SDAP respects all your current security policies without requiring changes.
Automatic session context configuration enables your existing RLS policies to work seamlessly with AI queries.
Each user gets isolated database connections with their specific security context. This ensures complete separation and prevents privilege escalation.
Users can only access data they would normally see in your database. The SDAP never grants additional permissions beyond what you've configured.
What this prevents: No more "AI has access to everything" scenarios. No shared service accounts with elevated privileges. No data leaks because someone misconfigured an AI tool. Each query runs as the actual user - period.
Enterprise-grade security controls and compliance features
Organize and govern your data access patterns
Each project operates in complete isolation with its own semantic layer, user permissions, and audit trail.
Track data usage, maintain semantic consistency, and ensure compliance across all AI interactions.
Each project can have its own isolated LLM with project-specific ontology, ensuring AI responses are tailored to your business context and terminology.
Translation: Your finance team's AI knows "EBITDA" while your engineering team's AI knows "deployment pipelines" - no cross-contamination.
Deploy the Secure Database Access Proxy behind your firewall
SDAP runs in your environment with direct database access
Your data never leaves your network
Only accepts connections from Ekaya's infrastructure with valid JWTs
No VPN tunnels, no broad network access
Runs with minimal privileges - only impersonation rights
Can't read data directly, only impersonate authorized users
The security win: The SDAP service account requires valid user JWTs from your identity provider to access any data. Without legitimate user authentication tokens, the service account cannot perform any database operations.