Redshift Connection
The Redshift Connection tab contains the following sections: General and Redshift Connection.
General
In the General panel of Redshift Connection Editor, you can specify the package that stores the Redshift Connection shared resource, and the name and description of the shared resource.
The following fields are included in the General panel:
Field | Module property? | Description |
---|---|---|
Package | No |
The name of the package where the shared resource is added. |
Name | No | The name to be displayed as the label for the shared resource in the process. |
Description | No | A short description for the shared resource. |
Redshift Connection
In the Redshift Connection panel, you can specify the connection details to establish a connection with Amazon Redshift.
The following fields are included in the Redshift Connection panel:
Condition Applicable | Field | Module Property? | Description |
---|---|---|---|
N/A | AWS Region | Yes | The AWS region in which the cluster is located. |
N/A | Authentication Type | Yes |
Select an authentication mechanism. In this version, the following authentication types are supported:
To use Container Credentials, you must Note: Container Credentials do not support downloading the schema during connection resource configuration.
Also, for information about Amazon ECS container credentials, see AWS documentation. |
N/A | Database | Yes | It is the name of the database where the plug-in activities are performed. |
N/A | Username | Yes | Enter the username of the account to be used for authentication. |
This field is enabled only when the Authentication Type is SAML Authentication and the Provider is Okta . |
Password | Yes |
Enter the password of the account to be used for authentication. |
Available only when the Authentication Type is selected as SAML Authentication. | Identity Provider | No | Select the provider for a particular Authentication Type. In this version, the following authentication providers are available:
|
Identity Provider Login | Yes |
The user should provide the embedded URL on the Okta SSO app. This field is enabled only when the Authentication Type is |
|
N/A | Cluster Name | Yes | It is the Name of the Redshift cluster. |
Available only when the Authentication Type is selected as Username/Password. | Access Key | Yes | An AWS access key of the user who accesses Redshift and S3 services. It is enabled for basic authentication. |
Secret Key | Yes | The secret key of the user who accesses Redshift and S3 services. It is enabled for basic authentication. | |
N/A | Role ARN | Yes |
The Amazon Resource Names (ARN) of the role associated with the Redshift cluster.
The AWS documentation reference on Redshift for necessary permissions to be associated with the role can load data to and read data from S3 buckets and perform operation on the Redshift cluster and the Redshift Data API. |
Available only when the Authentication Type is selected as SAML Authentication. | Principal ARN | Yes | The ARN of the Okta identity provider. |
Token Expiration Duration | Yes | The validity period of session token. Default value is 60 min. | |
Available only when the Authentication Type is selected as Username/Password, Default Credentials Provider Chain, or Container Credentials. | Role Session Name | Yes | Unique session name. |
Amazon Connection Advanced Configuration
The following table describes the fields in the Amazon Connection Advanced Configuration tab of the Amazon Redshift shared resource:
The following table describes the fields:
Field | Module Property? | Description |
---|---|---|
Connection Timeout in seconds | Yes | Number of milliseconds that the attempt to create an AWS client connection waits before timing out
Defaults to 10 seconds |
Client Execution Timeout | Yes | Default HTTP timeout for all requests made on this connection
Disabled by default: 0 seconds |
Max. Error Retry | Yes | Number of retries the AWS client attempts for HTTP error code 5xx before reporting an error |
Request Timeout in seconds | Yes | Number of milliseconds any request can take before being timed out.
A request may constitute several individual HTTP requests. This is the difference between this setting and the ClientExecutionTimeout setting. Disabled by default: 0 |
User Privileges
The following table lists permissions and resources for the user role associated with Redshift:
Permissions | Resources |
---|---|
All permissions for Redshift |
|
All permissions on Redshift Data API |
The resources must include all buckets and sub-directories of buckets to be used in the Redshift operation.
SAML Authentication
In case of SAML authentication with Okta as identity provider, the role must have the necessary permissions to work with S3, Redshift Cluster, and Redshift Data API.
In the given Redshift cluster, users must have the following required database privileges:
-
Group names defined in Redshift must match the group names in the identity provider.
-
Usage permission for all schemas to for which they must have access.
-
All permissions on the tables within the schema (Minimum of
CREATE
,SELECT
, andDELETE
).
-
The users who are not the owners of the database objects must be explicitly granted the above permissions on the tables they access.