Using Okta Service
You can configure the connector to authenticate your connection through IAM authentication using the credentials stored in Okta.
To configure IAM authentication using Okta:
- To access the IAM authentication options, open the ODBC Data Source Administrator where you created the DSN, select the DSN, and then click Configure.
- From the Auth Type drop-down list, select Identity Provider: Okta.
- In the User field, type the user name associated with your Okta account.
- In the Password field, type the password associated with your Okta user name. If you are using a profile, this may be optional.
- Encrypt your credentials by selecting one of the following:
- If the credentials are used only by the current Windows user, select Current User Only.
- Or, if the credentials are used by all users on the current Windows machine, select All Users Of This Machine.
- If the ID and region of the Redshift server cluster are not already provided through the Server field, then do the following:
- In the Cluster ID field, type the ID for the Redshift server cluster.
- In the Region field, type the region for the Redshift server cluster.
- In the DbUser field, type the ID that you want to designate to the Redshift user.
- If the ID you entered in the DbUser field does not already exist in your Redshift account, you must create it:
- Select the User AutoCreate check box.
- In the DbGroups field, type the names of any user groups that you want the new DbUser to be added to, separated by commas.
- Optionally, to lowercase all DbGroups that are received from the identity provider, select the Force Lowercase check box.
- Optionally, in the Endpoint URL field, type the endpoint used to communicate with the Redshift cluster.
- Optionally, in the STS Endpoint URL field, type the endpoint used to communicate with the AWS Security Token Service (AWS STS).
- Optionally, in the AuthProfile field, type the authentication profile you want to use to manage the connection settings, then do the following:
- In the AccessKeyID field, type your Redshift access key ID.
- In the SecretAccessKey field, type your Redshift secret key.
- In the IdP Host field, type the address of the service host.
- In the Preferred Role field, type the name or ID for the IAM role you want the user to assume when logged in to Redshift.
- In the Okta App ID field, type the Okta-supplied ID associated with your Redshift application.
- Optionally, in the Okta App Name field, type the name of your Okta application.
- To save your settings and close the dialog box, click OK.
Related topics
- Security and Authentication
- Authentication Driver Configuration Options on page 1
- Configuring Authentication
- Creating a Data Source Name