At cluster level, there are two security management options available to prevent unauthorized access.
The following lists the security management options:
Role Based Access
: With AWS Identity and Access Management (IAM) Role, you can securely control access to Amazon Redshift resources for the users in your AWS account. If you have multiple users that require access to Amazon Redshift, create an IAM Role for each users and provide a specific access policies to each users. You do not have to share your credentials. For more information about how to create an IAM Role and add IAM Role to a cluster, see the AWS documentation.
Key Based Access
: You can provide the
Access Key ID
and
Secret Access Key
for all the users with IAM Role that are authorized to access the Amazon resources that contains the data.
The following image shows the
Access Key ID
and
Secret Access Key
connection properties:
Informatica recommends that you use the IAM Role based access option to access resources and sensitive data.