Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Connectors and Connections
  3. Data Ingestion and Replication connectors
  4. Data Ingestion and Replication connection properties

Connectors and Connections

Connectors and Connections

Connection details

Connection details

The following table describes the basic connection properties:
Property
Description
Connection Name
Name of the connection. Each connection name must be unique within the organization. Connection names can contain alphanumeric characters, spaces, and the following special characters: _. + -, Maximum length is 255 characters.
Description
Description of the connection. Maximum length is 4000 characters.
Use Secret Vault
Stores sensitive credentials for this connection in the secrets manager that is configured for your organization.
This property appears only if secrets manager is set up for your organization.
This property is not supported by
Data Ingestion and Replication
and the
Data Access Management
services.
When you enable the secret vault in the connection, you can select which credentials that the Secure Agent retrieves from the secrets manager. If you don't enable this option, the credentials are stored in the repository or on a local Secure Agent, depending on how your organization is configured.
If you’re using this connection to apply data access policies through pushdown or proxy services, you cannot use the Secret Vault configuration option.
For information about how to configure and use a secrets manager, see
"Secrets manager configuration" in the Administrator help
.
Runtime Environment
Name of the runtime environment where you want to run tasks.
For
application ingestion and replication
tasks and
database ingestion and replication
tasks, you can use a Secure Agent or serverless runtime environment. The tasks must have a source type supported for serverless use. For file ingestion and replication tasks, use a Secure Agent. You can't run an
application ingestion and replication
task,
database ingestion and replication
task, or file ingestion and replication task on a Hosted Agent or elastic runtime environment.
For more information about how to configure and use the runtime environments, see
Runtime Environments
in the Administrator help.

0 COMMENTS

We’d like to hear from you!