Administrator
- Administrator
- All Products
Connection property | Description |
|---|---|
Connection Name | Name of the connection.
Each connection name must be unique within the organization. Connection names can contain alphanumeric characters, spaces, and the following special characters: _ . + -,
Maximum length is 255 characters.
|
Description | Description of the connection. Maximum length is 4000 characters.
|
Use Secret Vault | Stores sensitive credentials for this connection in the secrets manager that is configured for your organization.
This property appears only if secrets manager is set up for your organization.
This property is not
supported by Data Ingestion and Replication and the Data Access Management services. When you enable the secret vault in the connection, you can select
which credentials that the Secure Agent retrieves from the secrets manager. If you
don't enable this option, the credentials are stored in the repository or on a local
Secure Agent, depending on how your organization is configured. If you’re using this connection
to apply data access policies through pushdown or proxy services, you cannot use
the Secret Vault configuration option. For information about how to configure and use a secrets manager, see
"Secrets manager configuration" in the Administrator help .
|
Runtime Environment | Name of the runtime environment where you want to run the tasks. For more information about how to configure
and use the runtime environments, see Runtime Environments in the
Administrator help. |
Database | Name of the Yellowbrick Data Warehouse that you want to connect to. |
Host Name | Hostname or IP address of the Yellowbrick server. |
Password | Password for the Yellowbrick Data Warehouse. |
Port No | Port number of the Yellowbrick Data Warehouse. |
Schema Name | Name of the schema. Required if you select Specified for Schema Policy. |
Schema Policy | Policy for naming the schemas for tables. Select one of the following options:
|
User Name | User name for the Yellowbrick Data Warehouse. |
Secure Connection | Select this option to use TLS to secure the communication with Yellowbrick. Default
is false. |
Secure CA Cert | Use the name of the custom PEM-encoded certificate file or the name and password of the
JKS keystore file to customize trust with secure communications. The
name and password of the JKS keystore file must be in the following
format: FILENAME:PASSWORD If a file name is not
specified, use the following fallback root CA certificate
file: Windows:
%APPDATA%\postgresql\root.crt If
the file exists, it will be treated the same as a specified
Secure CA Certificate file. For more information, see the
Yellowbrick Documentation Library. |
Secure Disable Trust | Select this option to disable the SSL and TLS trust when you use a secured
connection. Default is false. |