Redshift Connection
The Redshift Connection tab contains the following sections: General and Redshift Connection.
General
In the General panel of Redshift Connection Editor, you can specify the package that stores the Redshift Connection Connection shared resource, and the name and description of the shared resource.
The following fields are included in the General panel:
Field | Module Property? | Description |
---|---|---|
Package | No |
The name of the package where the shared resource is added. |
Name | No | The name to be displayed as the label for the shared resource in the process. |
Description | No | A short description for the shared resource. |
Redshift Connection
In the Redshift Connection panel, you can specify the connection details to establish a connection with Amazon Redshift.
The following fields are included in the Redshift Connection panel:
Field | Module Property? | Description |
---|---|---|
Authentication type | No |
Select authentication mechanism. In this version, the following authentication types are supported:
|
Provider | No | Select the provider for a particular Authentication Type. In this version, the following authentication providers are available:
|
Database | Yes | It is the Name of the database where the plug-in activities are performed. |
Username | Yes | Enter the user name of the account to be used for authentication. |
Password | Yes |
Enter the password of the account to be used for authentication. |
Okta Endpoint URL | Yes |
The user should provide the embedded URL on the Okta SSO app. This field is enabled only when the Authentication Type is |
Cluster Name | Yes | It is the Name of the Redshift cluster. |
Access Key | Yes | An AWS access key of the user who accesses Redshift and S3 services. It is enabled for basic authentication. |
Secret Key | Yes | The secret key of the user who accesses Redshift and S3 services. It is enabled for basic authentication. |
Role ARN | Yes |
The Amazon Resource Names (ARN) of the role associated with the Redshift cluster.
The AWS documentation reference on Redshift for necessary permissions to be associated with the role can load data to and read data from S3 buckets and perform operation on the Redshift cluster and the Redshift Data API. |
Principal ARN | Yes | The ARN of the Okta identity provider. |
AWS Region | Yes | The AWS region in which cluster is located. |
AWS Session Name | Yes | Unique session name. |
User Privileges
The following table lists permissions and resources for the user role associated with Redshift:
Permissions | Resources |
---|---|
All permissions for Redshift |
|
All permissions on Redshift Data API |
The resources must include all buckets and sub-directories of buckets to be used in the Redshift operation.
SAML authentication
In case of SAML authentication with Okta as identity provider, the role must have necessary permissions to work with S3, Redshift Cluster, and Redshift Data API.
In the given Redshift cluster, users must have the following required database privileges:
-
Group names defined in Redshift must match the group names in the identity provider.
-
Usage permission for all schemas to for which they must want have access.
-
All permissions on the tables within the schema (Minimum of
CREATE
,SELECT
, andDELETE
).
-
The users who are not the owners of the database objects must be explicitly granted the above permissions on the tables they access.