Basic Tab

The following table and the sections below lists and explains the connection properties that are in the Basic Tab of the New Data Source Window.

Datasource Name

The name of the Datasource.

Host

Name of the host machine or the host machine’s IP address.

Port

Port number for the data source to connect with the host.

The Port number for Greenplum is 5432.

Database Name

Name or alias of the underlying data source. TDV Server uses this name to find and connect to the data source.

Login/User, Password

User name and password required to access the data source.

Pass-through Login

Flag to indicate whether pass-through login is enabled or not.

Transaction Isolation

The degree to which transactions are isolated from data modifications made by other transactions.

Authentication Indicates the Authentication type. Choose between BASIC and KERBEROS.
Kerbos Server Name Name of the Kerberos server.
Include Realm This field is enabled only when KERBEROS Authentication is used. If this field is disabled, the Greenplum Database role name is the Kerberos principal name without the Kerberos realm. If it is Enabled, the Kerberos realm is not stripped from the Greenplum Database rolename.
Keytab File Use to enable Kerberos security through Keytab files. Type the full path to the Keytab file.

Service Principal Name

This field is available only if you choose Kerberos authentication.

Datasource Name

The name of the data source.

Data Type

string

Default Value

""

Host

Name of the host machine or the host machine’s IP address.

Data Type

string

Default Value

""

Port

The Port number

Data Type

string

Default Value

""

Database Name

Name or alias of the underlying data source. TDV Server uses this name to find and connect to the data source.

Data Type

string

Default Value

""

Login/User, Password

User name and password required to access the data source.

Data Type

string

Default Value

“”

Remarks

When the data source is used as a target for cache tables or data ship, the user must also have permission to create tables, execute DDL, and perform other required tasks. Refer to the individual data source descriptions for details.

Transaction Isolation

The degree to which transactions are isolated from data modifications made by other transactions.

Data Type

string

Default Value

NONE

Remarks

Valid values are:

Read Uncommitted—Dirty reads, nonrepeatable reads, and phantom reads can occur.
Read Committed—Nonrepeatable reads and phantom reads can occur.
Repeatable Read—Only phantom reads can occur.
Serializable—Dirty reads, nonrepeatable reads, and phantom reads are prevented.
None

Authentication

Indicates the Authentication type. Choose between BASIC and KERBEROS.

Data Type

String

Default Value

BASIC

Remarks

None

Kerbos Server Name

Name of the Kerberos server.

Data Type

String

Default Value

""

Remarks

None

Include Realm

This field is enabled only when KERBEROS Authentication is used. If this field is disabled, the Greenplum Database role name is the Kerberos principal name without the Kerberos realm. If it is Enabled, the Kerberos realm is not stripped from the Greenplum Database rolename.

Data Type

Bool

Default Value

False

Remarks

None

Keytab File

Use to enable Kerberos security through Keytab files. Type the full path to the Keytab file.

Data Type

String

Default Value

""

Reamrks

None

Service Principal Name

This field is available only if you choose Kerberos authentication.

Data Type

This field is available only if you choose Kerberos authentication.

Default Value

""

Remarks

None

Pass-through Login

Flag to indicate whether pass-through login is enabled or not.

Data Type

string

Default Value

""

Remarks

Disabled (default)—This allows automated provisioning of a connection pool. Open connection threads can be used by authorized users after the validation query verifies connection status. If pass-through login is disabled, the Save Password check box is not available.

Enabled—A new connection to the data source uses the credentials supplied by the client when data is requested from that data source for the first time. Subsequent requests by the same user reuse the existing connection. When another user attempts to connect to a data source, a new connection is created.

See “Managing Security for TDV Resources” in the TDV Administration Guide for details.