Using PingFederate Service on Windows
You can configure the connector to authenticate your connection through IAM authentication using the credentials stored in the PingFederate service.
To configure IAM authentication using PingFederate service:
- To access the IAM authentication options, open the ODBC Data Source Administrator where you created the DSN, select the DSN, and then click Configure.
- From the Auth Type drop-down list, select Identity Provider: PingFederate.
- In the User field, type the user name associated with your Ping account.
- In the Password field, type the password associated with your Ping user name.
- If the ID and region of the Redshift server cluster are not already provided through the Server field, then do the following:
- In the Cluster ID field, type the ID for the Redshift server cluster.
- In the Region field, type the region for the Redshift server cluster.
- In the DbUser field, type the ID that you want to designate to the Redshift user.
- If the ID you entered in the DbUser field does not already exist in your Redshift account, you must create it:
- Select the User AutoCreate check box.
- In the DbGroups field, type the names of any user groups that you want the new DbUser to be added to, separated by commas.
- Optionally, to lowercase all DbGroups that are received from the identity provider, select the Force Lowercase check box.
- Optionally, in the Endpoint URL field, type the endpoint used to communicate with the Redshift cluster.
- Optionally, in the STS Endpoint URL field, type the endpoint used to communicate with the AWS Security Token Service (AWS STS).
- Optionally, in the AuthProfile field, type the authentication profile you want to use to manage the connection settings, then do the following:
- In the AccessKeyID field, type your Redshift access key ID.
- In the SecretAccessKey field, type your Redshift secret key.
- In the IdP Host field, type the address of the service host.
- In the IdP Port field, type the port number the service listens at.
- To skip verification of the SSL certificate of the IDP server, select the SSL Insecure check box.
- In the Preferred Role field, type the name or ID for the IAM role you want the user to assume when logged in to Redshift.
- Optionally, in the Partner SPID field, type a partner SPID (service provider ID) value.
- To save your settings and close the dialog box, click OK.
Related topics
- Security and Authentication
- Authentication Driver Configuration Options on page 1
- Configuring Authentication
- Creating a Data Source Name