Table of Contents

Search

  1. Preface
  2. Connectors and Connections
  3. Data Ingestion and Replication connectors
  4. Data Ingestion and Replication connection properties

Connectors and Connections

Connectors and Connections

KRB5 authentication

KRB5 authentication

To configure KRB5 authentication, you must configure the Secure Agent hosted on the Linux machine and ensure that the Kerberos artifacts directory contains the Kerberos configuration files.
Data Ingestion and Replication
does not support the KRB5 authentication type.
The following table describes the basic connection properties for KRB5 authentication:
Property
Description
Username
The Kerberos user name that authenticates to the Teradata database.
The following table describes the advanced connection properties for KRB5 authentication:
Property
Description
Kerberos Artifacts Directory
Directory that contains the Kerberos configuration files.
This directory contains the following configuration files:
  • krb5.conf
  • IICSTPT.keytab

0 COMMENTS

We’d like to hear from you!