Encryption
| Layer | Standard |
|---|---|
| Credentials at rest | AES-256 |
| Data in transit | TLS 1.3 |
Minimal Permissions per Destination
Always create a dedicated user with the minimum permissions required:| Destination | Recommended Permissions |
|---|---|
| PostgreSQL | CREATE TABLE, INSERT, UPDATE on target schema |
| MongoDB | readWrite role on target database |
| Elasticsearch | Write access to target index (or index creation privileges) |
| Algolia | Admin API Key with write access to target index |
| Meilisearch | Master key or admin key with write access |
IP Whitelisting
For maximum security, restrict inbound connections to your destination to only Jobo’s IP addresses.Contact support to get the current IP range for whitelisting. We recommend
keeping your whitelist up to date and reviewing it periodically.
- PostgreSQL
pg_hba.confor cloud firewall rules - MongoDB Atlas Network Access list
- Elasticsearch cluster security groups
- Any self-hosted destination behind a firewall
Best Practices
Use dedicated credentials
Create a separate database user with minimal permissions for the Jobo feed.
Never share credentials with other applications.
Enable TLS
Always use encrypted connections (
ssl_mode: require for PostgreSQL,
mongodb+srv:// for MongoDB, HTTPS for search engines).Restrict network access
Whitelist only Jobo’s IP addresses in your firewall rules. Contact support
for the current IP range.

