Configuring AssumeRole Authentication for Amazon Redshift V2 Connector

Configuring AssumeRole Authentication for Amazon Redshift V2 Connector

AssumeRole with an existing database user

AssumeRole with an existing database user

To connect to Redshift using an existing database user by using an IAM user to assume a role, specify the database user, Redshift access key and secret key, and the Redshift IAM role in the connection properties.
For an IAM user to assume a role, attach the following AWS IAM user policies in the AWS console:
  • AWS IAM user policy for the Redshift access key and secret key:
    AWS permission policy for access key and secret key
  • AWS IAM role policy of the Redshift IAM role ARN for an existing database user:
    AWS permission policy for Redshift IAM Role ARN
  • Trust policy that defines which user can assume the Redshift role:
    AWS Trust policy for AssumeRole
After you define the policies, you can specify the following attributes in the connection properties for an existing database user:
To assume a role using the existing database user

0 COMMENTS

We’d like to hear from you!