Data Integration Connectors
- Data Integration Connectors
- All Products
Property
| Description
|
---|---|
Connection Name
| Name of the connection.
Each connection name must be unique within the organization. Connection names can contain alphanumeric characters, spaces, and the following special characters: _ . + -,
Maximum length is 255 characters.
|
Description
| Description of the connection. Maximum length is 4000 characters.
|
Type
| The Amazon S3 V2 connection type.
|
Runtime Environment
| Name of the runtime environment where you want to run the tasks.
Select a Secure Agent, Hosted Agent, or serverless runtime environment.
|
Access Key
| Access key to access the Amazon S3 bucket.
Enter the access key value based on the following authentication methods:
|
Secret Key
| Secret access key to access the Amazon S3 bucket. The secret key is associated with the access key and uniquely identifies the account.
Enter the secret access key value based on the following authentication methods:
|
IAM Role ARN
| The Amazon Resource Name (ARN) of the AWS Identity and Access Management (IAM) role assumed by the user to use the dynamically generated temporary security credentials.
Enter the value of this property if you want to use the temporary security credentials to access the AWS resources.
Even if you remove the IAM role that enables the agent to access the Amazon S3 bucket and create a connection, the test connection is successful.
For more information about how to get the ARN of the IAM role, see the AWS documentation.
|
External Id
| Provides a more secure access to the Amazon S3 bucket when the Amazon S3 bucket is in a different AWS account.
|
Use EC2 Role to Assume Role
| Enables the EC2 role to assume another IAM role specified in the IAM Role ARN option.
The EC2 role must have a policy attached with a permission to assume an IAM role from the same or different account.
|
Folder Path
| Bucket name or complete folder path to the Amazon S3 objects.
Don't use a slash at the end of the folder path. For example,
<bucket name>/<my folder name> |
Master Symmetric Key
| A 256-bit AES encryption key in the Base64 format when you use client-side encryption. You can generate a key using a third-party tool.
|
Customer Master Key ID
| The customer master key ID or alias name generated by AWS Key Management Service (AWS KMS) or the Amazon Resource Name (ARN) of your custom key for cross-account access.
Cross-account access is not available for mappings in advanced mode.
You must generate the customer master key for the same region where the Amazon S3 bucket resides.
You can specify the following master keys:
|
S3 Account Type
| The type of the Amazon S3 account.
Select from the following options:
Default is Amazon S3 storage.
|
REST Endpoint
| The S3 storage endpoint required for S3 compatible storage.
For example, http://s3.isv.scality.com.
|
Region Name
| The AWS region of the bucket that you want to access.
Select one of the following regions:
Africa(Cape Town)
Asia Pacific(Mumbai)
Asis Pacific(Jakarta)
Asia Pacific (Osaka)
Asia Pacific(Seoul)
Asia Pacific(Singapore)
Asia Pacific(Sydney)
Asia Pacific(Tokyo)
Asia Pacific(Hong Kong)
AWS GovCloud(US)
AWS GovCloud(US-East)
Canada(Central)
China(Bejing)
China(Ningxia)
EU(Ireland)
EU(Frankfurt)
EU(London)
EU(Milan)
EU(Paris)
EU(Stockholm)
South America(Sao Paulo)
Middle East(Bahrain)
Middle East(UAE)
US East(N. Virginia)
US East(Ohio)
US ISO East
US ISOB East(Ohio)
US ISO West
US West(N. California)
US West(Oregon)
Default is US East(N. Virginia).
|
Federated SSO IdP 1
| SAML 2.0-enabled identity provider for the federated user single sign-on to use with the AWS account.
Amazon S3 V2 connector supports only the ADFS 3.0 identity provider. Select
None if you don't want to use federated user single sign-on.
Federated user single sign-on is not applicable to mappings in advanced mode.
|
Other Authentication Type 1
| Select one the following authentication types:
Enter the credential profile file path and the profile name to establish the connection with Amazon S3.
You can use permanent IAM credentials or temporary session tokens when you configure the Credential Profile File Authentication.
Default is NONE.
|
Credential Profile File Path 1
| Specifies the credential profile file path.
If you don't enter the credential profile path, the Secure Agent uses the credential profile file present in the following default location in your home directory:
~/.aws/credentials
|
Profile Name 1
| Name of the profile in the credential profile file used to get the credentials.
If you don't enter the profile name, the credentials from the default profile in the credential profile file are used.
|
S3 VPC Endpoint Type 1
| The VPC endpoint type for Amazon S3.
You can enable private communication with Amazon S3 by selecting a VPC endpoint.
Select one of the following VPC endpoint types:
Default is None.
|
Endpoint DNS Name for Amazon S3 1
| The DNS name for the Amazon S3 interface endpoint.
Enter the DNS name in the following format:
bucket.<DNS name of the interface endpoint>
|
STS VPC Endpoint Type 1
| Applicable when you select the S3 VPC interface endpoint.
The VPC endpoint type for AWS STS.
When you select
IAM Role ARN or
Federated SSO IdP , configure the STS VPC endpoint.
|
Endpoint DNS Name for AWS STS service 1
| The DNS name for the AWS STS interface endpoint.
|
KMS VPC Endpoint Type 1
| Applicable when you select the interface endpoint.
The VPC endpoint type for the AWS KMS.
When you select
Customer Master Key ID , configure the KMS VPC endpoint.
|
Endpoint DNS Name for AWS KMS service 1
| The DNS name for the AWS KMS interface endpoint.
|
1
Applies only to mappings.
|
Property
| Description
|
---|---|
Federated User Name
| User name of the federated user to access the AWS account through the identity provider.
|
Federated User Password
| Password for the federated user to access the AWS account through the identity provider.
|
IdP SSO URL
| Single sign-on URL of the identity provider for AWS.
|
SAML Identity Provider ARN
| ARN of the SAML identity provider that the AWS administrator created to register the identity provider as a trusted provider.
|
Role ARN
| ARN of the IAM role assumed by the federated user.
|