Configuring AssumeRole Authentication for Amazon Redshift V2 Connector

Configuring AssumeRole Authentication for Amazon Redshift V2 Connector

AssumeRole with a new database user

AssumeRole with a new database user

For a new user to connect to Redshift database using the IAM user to assume a role, you must select the
Auto Create DBUser
option in the Amazon Redshift connection section. Specify Redshift access key and secret key of the IAM user and Redshift IAM role in the connection properties.
Also, attach the permission policy in AWS to the Redshift IAM role.
For an IAM user to assume a role, attach the following AWS IAM user policies in the AWS console:
  • AWS IAM user policy for the Redshift access key and secret key:
    AWS permission policy for access key and secret key
  • AWS IAM role policy of the Redshift IAM role ARN for a new database user:
    Permission policy for new database user
  • Trust policy that defines which user can assume the Redshift role:
    AWS Trust policy for AssumeRole
After you define the policies, you can specify the following attributes in the connection properties for a new database user:
To assume a role for a new database user
You can also add the new user to a database group where the user can inherit all the permissions that are associated to the group. Additionally, you can set the
AutoCreateDBUser
to true to create new users at runtime.

0 COMMENTS

We’d like to hear from you!