As a user, you can use Amazon Redshift Connector after the organization administrator ensures
that users have access to the Secure Agent directory that contains the success and error
files. This directory path must be the same on each Secure Agent machine in the runtime
environment. The organization administrator must also perform the following tasks:
Enable the connector for the runtime environment. For more information about enabling
connectors, see
Service and connector assignment
in the Administrator
help.
Get the Amazon Redshift JDBC URL.
Manage Authentication. Use either of
the following two methods:
Create an Access Key ID and
Secret Access Key.
Provide the values for access key ID and secret
access key when you configure the Amazon Redshift connection. For
more information about creating an access key ID and secret access
key, see the AWS documentation.
Configure AWS Identity and
Access Management (IAM) Authentication to enhance security.
If you
use IAM authentication, do not provide access key ID and secret
access key explicitly in the Amazon Redshift connection. Instead,
you must create an Redshift Role Amazon Resource Name (ARN), add the
minimal Amazon IAM policy to the Redshift Role ARN, and add the
Redshift Role ARN to the Redshift cluster.
Provide the Redshift Role ARN in the AWS_IAM_ROLE option in the
UNLOAD and COPY commands when you create a task.
If you specify both, access key ID and secret access key in the
connection properties and AWS_IAM_ROLE in the UNLOAD and COPY
commands, AWS_IAM_ROLE takes the precedence.
You must add IAM EC2 role and IAM Redshift role to the customer
master key when you use IAM authentication and server-side
encryption using customer master key.
Hosted Agent does not support IAM authentication. For more
information about how to configure IAM authentication for Amazon
Redshift Connector, see IAM authentication
Configure Amazon Redshift for SSL if
you want to support an SSL connection.
Create a master symmetric key if you
want to enable client-side encryption.
Create an AWS Key Management Service
(AWS KMS)-managed customer master key if you want to enable server-side
encryption.
Create minimal Amazon IAM policy for
Amazon Redshift Connector.
When you create a temporary table for
an upsert, update, or delete operation in the local staging area, you must
create the temporary table in the following format:
By default, you have the
permission to create the temporary tables as you have the PUBLIC group
membership. To deny the permission, revoke the TEMP permission from the
PUBLIC group and allow the TEMP permission to specific or groups of
individuals.