Connect from other MySQL tools Stay organized with collections Save and categorize content based on your preferences.
This page describes several common databaseadministration and reporting tools that you can use to connect to your Cloud SQL instances.
Overview
Database administration and reporting tools provide varying degrees of supportfor managing your database. Select a tool based on the type ofadministration and reporting that you need to do. For example, if you need toconnect to one database and issue a few SQL commands, considerusing the MySQL client.SeeConnecting MySQL Client Using IP Addresses.If you need to design or manage many databases simultaneously, thenuse one of the visual-based tools discussed here.
We discuss a limited number of tools in this page. If your tool is not discussed, it's likely that you can successfully connect by following the steps for a similar tool.
Connect with MySQL Workbench
This section shows how to connect to yourCloud SQL instance database withMySQL Workbench.
Note: Add your MySQL Workbench machine's IP address as anauthorized network for your Cloud SQL instance.- In the MySQL Workbench home view, clickNew Connection.
- In theSetup new connection form, provide aConnection Name,Hostname,Username, andDefault Schema, if applicable, as show in Figure 1.

Figure 1: New connection in MySQL WorkbenchSetup New Connection form. - ClickTest Connection. You are prompted for a password.
- Optionally, clickAdvanced, and fill in the information for connecting with SSL as shown in Figure 2. Be sure to selectUse SSL if available and specify anSSL CA File, anSSL CERT File, and anSSL key File.Learn more about using SSL certificates with Cloud SQL.

Figure 2: Specifying advanced options in the MySQL WorkbenchSetup New Connection form. - ClickTest Connection to make sure all the advanced parameters are set correctly.
- ClickClose.
- Connect with the connection you created.
- Once connected, you can test if you're using SSL by executing the following SQL statement:
SHOWSTATUSlike'ssl_cipher';

Figure 3: Testing if the MySQL Workbench connection uses SSL.
Connect with Toad for MySQL
This section shows how to connect to yourCloud SQL instance database withToad for MySQL.
- In Toad for MySQL, create a new connection.
- In theNew MySQL Connection form, fill in the following information:
- User: The name of a user in your MySQL database.
- Password: The password for the specified user.
- Host: The IP address of your instance. For more information, see Configuring Application Access Control. If you've mapped the IP address to the hostname of your local server, you can use that in this field.
- Database: The database instance to connect to.

Figure 4: The Create New Connection dialog box in Toad for Mac - ClickTest Connection to confirm that the connection information is correct.
- ClickOK to start the connection.
- In theEnter Password dialog box, enter the password for the user. This dialog box appears because we did not choose Save password (encrypted) in theCreate New Connection dialog box.
Configure Toad to use SSL
In Figure 5, aCreate New Connection dialog box is shown with information for connecting with SSL. All versions of Toad might not support connecting with SSL.

Once connected, you can test if you're using SSL by executing the following SQL statement and verifying that thessl_cipher value is not empty:
SHOWSTATUSlike'ssl_cipher';
Connect with SQuirrel SQL
This section shows how to connect to yourCloud SQL instance database withSQuirrel SQL.
- In the SQuirrel SQL client, select theAliases panel to make it active.
- In theAliases menu, selectNew Alias.
- Fill out the information, as shown in Figure 6. Be sure to select the MySQL Driver and provide values for<instance-ip>,<database>, and<user-name>.
Note: The connection URL for using SSL is of the form:
jdbc:mysql://<instance-ip>:3306/<database>?verifyServerCertificate=true&useSSL=true&requireSSL=true. However, to use SSL, you must specify truststore files created from the CA certificate, the client certificate, and the client key you obtained when you created an SSL certificate.For more information, seeConfiguring a SQuirrel SQL connection to use SSL.
Figure 6: Configuring a SQuirrel SQL connection to MySQL. - ClickTest to test the connection. You are prompted for a password.
- ClickOK to save the alias.
- In theAliases panel, right-click the alias you created and selectConnect.
Configure SQuirrel SQL to use SSL
This section assumes that you've created an SSL certificate (seeConfiguring SSL for an instance)and you have three files:
- A CA certificate file, for example,ca-cert.pem.
- A client public key certificate file, for example,client-cert.pem.
- A client private key file, for example,client-key.pem.
Use these files as described inConnecting Securely Using SSL in the MySQL Reference Manual to create keystore and truststore files. You need to specify the keystore and truststore files when you start SQuirrel SQL. One way to do this is to edit the script that launches the SQuirrel SQL application as follows:
$JAVACMD -Djavax.net.ssl.keyStore=<path-to-keystore> \ -Djavax.net.ssl.keyStorePassword=<keystore-password> \ -Djavax.net.ssl.trustStore=<path-to-truststore> \ -Djavax.net.ssl.trustStorePassword=<truststore-password> \ [existing launch parameters]
After you've started SQuirrel SQL with the valid keystore and truststore information, you can connect with:
jdbc:mysql://<instance-ip>:3306/<database>?verifyServerCertificate=true&useSSL=true&requireSSL=true
Once connected, you can test if you're using SSL by executing the following SQL statement and verifying that thessl_cipher value is not empty:
SHOWSTATUSlike'ssl_cipher';
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-12-15 UTC.