Amazon Redshift Connector Best Practices

Amazon Redshift Connector Best Practices

Access Management

Access Management

At cluster level, there are two security management options available to prevent unauthorized access.
The following lists the security management options:
  • Role Based Access
    : With AWS Identity and Access Management (IAM) Role, you can securely control access to Amazon Redshift resources for the users in your AWS account. If you have multiple users that require access to Amazon Redshift, create an IAM Role for each users and provide a specific access policies to each users. You do not have to share your credentials. For more information about how to create an IAM Role and add IAM Role to a cluster, see the AWS documentation.
  • Key Based Access
    : You can provide the
    Access Key ID
    and
    Secret Access Key
    for all the users with IAM Role that are authorized to access the Amazon resources that contains the data.
    The following image shows the
    Access Key ID
    and
    Secret Access Key
    connection properties:
    Informatica recommends that you use the IAM Role based access option to access resources and sensitive data.

0 COMMENTS

We’d like to hear from you!