Using an IAM Profile
You can configure the connector to authenticate your connection through IAM authentication using the credentials stored in a chained roles profile or the Amazon EC2 instance profile.
Note:
- The default location for the credentials file that contains chained roles profiles is
~/.aws/Credentials
. The AWS_SHARED_CREDENTIALS_FILE environment variable can be used to point to a different credentials file. - If any of the information requested in the following steps is already a part of the profile you intend to use, that property can be omitted. If the default profile is configured on your local machine, you do not need to set any of these properties.
To configure IAM authentication using a profile:
- Set the
UID
property to an appropriate user name for accessing the Redshift server. - Set the
PWD
property to the password corresponding to the user name you provided above. - Set the
IAM
property to1
. - If the ID and region of the Redshift server cluster are not already provided through the
Server
property, then do the following: - Set the
ClusterID
property to the ID for the Redshift server cluster. - Set the
Region
property to the region for the Redshift server cluster. - Set the
DbUser
property to the ID that you want to designate to the Redshift user. - If the ID you specified for the
DbUser
property does not already exist in your Redshift account, you must create it:- Set the
AutoCreate
property to1
. - Set the
DbGroups
property to the names of any user groups that you want the new DbUser to be added to, separated by commas.
- Set the
- Optionally, set the
EndpointUrl
property to the endpoint used to communicate with the Redshift cluster. - Optionally, set the
StsEndpointUrl
property to the endpoint used to communicate with the AWS Security Token Service (AWS STS). - Optionally, set the
AuthProfile
property to the authentication profile you want to use to manage the connection settings, then do the following:- Set the
AccessKeyID
property to your Redshift access key ID. - Set the
SecretAccessKey
property to your Redshift secret key.
- Set the
- Optionally, set the
group_federation
property to1
to enable group federation. - Specify the profile that contains your credentials:
- To use a chained roles profile, set the
Profile
property to the name of the profile, and then either set theInstanceProfile
property to0
or make sure that it is not set at all. - Or, to use the Amazon EC2 instance profile, set the
InstanceProfile
property to1
.
- To use a chained roles profile, set the
Note:
If both properties are set, InstanceProfile
takes precedence and the connector uses the Amazon EC2 instance profile.
- Security and Authentication
- Authentication Driver Configuration Options on page 1
- Configuring Authentication
- Configuring the Driver on page 1