Installation
Set up Akeneo Exporter and connect your infrastructure.
Cloud SaaS — No Installation Required! Simply sign up and connect your database.
What You Need
- • Version 4.0+ with REST API enabled
- • OAuth 2.0 credentials (Client ID, Secret)
- • Read access to products, families, categories
- • MongoDB 4.4+ or PostgreSQL 12+
- • Read/write permissions
- • Network accessible from internet
- • Firewall allows Akeneo Exporter IPs
- • SSL/TLS encryption recommended
- • ~5-10 KB per product
- • Scale based on catalog size
Database Setup
Your data stays in your own database — we never store your product data. Collections/tables are created automatically on first export using upsert operations.
MongoDB
# Create database user with readWrite on all collections
db.createUser({
user: "akeneo_exporter",
pwd: "your_secure_password",
roles: [{ role: "readWrite", db: "your_database" }]
})
# Collections created automatically:
# - products, product_parents
# - reference_categories, reference_categories_tmp
# - reference_attributes, reference_attributes_tmp
# - reference_entity_records, reference_entity_records_tmpAtlas Users: Create user in Database Access, configure Network Access for our IPs.
PostgreSQL
CREATE DATABASE your_database;
CREATE USER akeneo_exporter
WITH PASSWORD 'your_secure_password';
GRANT ALL PRIVILEGES ON DATABASE your_database
TO akeneo_exporter;
-- PostgreSQL 15+ (stricter permissions)
GRANT ALL ON SCHEMA public TO akeneo_exporter;
-- Tables created automatically:
-- products, product_parents
-- reference_categories, reference_categories_tmp
-- reference_attributes, reference_attributes_tmp
-- reference_entity_records, reference_entity_records_tmpCloud Users: Configure security groups to allow port 5432 from our IPs.
Network Configuration
Whitelist our static IP addresses in your database firewall to allow secure connections.
IP Addresses to Whitelist
203.0.113.10203.0.113.11203.0.113.20203.0.113.21Note: Contact support for actual IP addresses. These are placeholders.
Security Best Practices
16+ characters with mixed case, numbers, and symbols. Use a password manager.
Use sslmode=require (PostgreSQL) or ssl=true (MongoDB).
Grant only readWrite access. Never use admin or root accounts.
Only allow our IPs. Block all other inbound traffic on database ports.
Change passwords every 90 days. Update config after rotation.
Enable audit logging. Review regularly for suspicious activity.
Use different databases for prod/staging with separate credentials.
Enable database encryption for compliance with data regulations.
Testing Your Setup
Verify all connections before your first export using built-in testing tools.
Navigate to Configurations → New Configuration. Enter URL, Client ID, Secret, Username, Password.
Click "Test Akeneo Connection" — success message or specific error details.
Select database type, enter connection URI, specify database name.
Click "Test Database Connection" — verifies connectivity and write permissions.
Both tests pass? Click "Save Configuration" to proceed.
Ready to Export! Green checkmarks confirm successful connections. If tests fail, check the Connection Errors guide.