Using an IAM Profile
You can configure the connector to authenticate your connection through IAM authentication using the credentials stored in a chained roles profile or the Amazon EC2 instance profile.
Note:
- The default location for the credentials file that contains chained roles profiles is
~/.aws/Credentials. The AWS_SHARED_CREDENTIALS_FILE environment variable can be used to point to a different credentials file. - If any of the information requested in the following steps is already a part of the profile you intend to use, that property can be omitted. If the default profile is configured on your local machine, you do not need to set any of these properties.
To configure IAM authentication using a profile:
- Set the
UIDproperty to an appropriate user name for accessing the Redshift server. - Set the
PWDproperty to the password corresponding to the user name you provided above. - Set the
IAMproperty to1. - If the ID and region of the Redshift server cluster are not already provided through the
Serverproperty, then do the following:- Set the
ClusterIDproperty to the ID for the Redshift server cluster. - Set the
Regionproperty to the region for the Redshift server cluster.
- Set the
- Set the
DbUserproperty to the ID that you want to designate to the Redshift user. - If the ID you specified for the
DbUserproperty does not already exist in your Redshift account, you must create it:- Set the
AutoCreateproperty to1. - Set the
DbGroupsproperty to the names of any user groups that you want the new DbUser to be added to, separated by commas. - Optionally, to lowercase all
DbGroupsthat are received from the identity provider, select theForce Lowercasecheck box.
- Set the
- Optionally, set the
EndpointUrlproperty to the endpoint used to communicate with the Redshift cluster. - Optionally, set the
StsEndpointUrlproperty to the endpoint used to communicate with the AWS Security Token Service (AWS STS). -
Optionally, set the
VpcEndpointUrlproperty to the endpoint used to communicate with the Redshift cluster. - Optionally, set the
AuthProfileproperty to the authentication profile you want to use to manage the connection settings, then do the following:- Set the
AccessKeyIDproperty to your Redshift access key ID. - Set the
SecretAccessKeyproperty to your Redshift secret key.
- Set the
- Optionally, set the
group_federationproperty to1to enable group federation. - Specify the profile that contains your credentials:
- To use a chained roles profile, set the
Profileproperty to the name of the profile, and then either set theInstanceProfileproperty to0or make sure that it is not set at all. - Or, to use the Amazon EC2 instance profile, set the
InstanceProfileproperty to1.
Note:If both properties are set,
InstanceProfiletakes precedence and the connector uses the Amazon EC2 instance profile. - To use a chained roles profile, set the