Hey @toki13! Welcome to the community.
Between the two options, SSH tunneling is generally the better, more secure option. You can apply fairly robust security rules - including IP allowlisting - on top of the more robust data encryption.
Hey @toki13! Welcome to the community.
Between the two options, SSH tunneling is generally the better, more secure option. You can apply fairly robust security rules - including IP allowlisting - on top of the more robust data encryption.