<password>
with a password of your choice).
📘 Creating a user without a password.
Role based auth does not require a password. You may create the user using CREATE USER <username> PASSWORD DISABLE;
.
create
and temporary
privileges on the database. create
allows the service to create new schemas and temporary
allows the service to create temporary tables.📘 The schema will be created during the first sync The schema name supplied as part of Step 4 will be created during the first connection. It does not need to be created manually in the destination ahead of time.
📘 🚧 If theschema
already exists By default, the service creates a new schema based on the destination configuration. If you prefer to create the schema yourself before connecting the destination, you must ensure that the writer user has the proper permissions on the schema, usingGRANT ALL ON schema <schema> TO <username>;
Once you’ve provided theGRANT ALL
permission on the schema, you can safely remove theCREATE
permission on the database (but you must retain theTEMPORARY
permission on the database).
35.192.85.117
:
a. Select Custom TCP in the drop-down menu.
b. Enter your Redshift port number. (likely 5439
)
c. Enter 35.192.85.117.
d. Click Add rule.BUCKET_NAME
with the name of the bucket chosen above, and REGION_NAME, ACCOUNT_ID, CLUSTER_NAME, USERNAME, and DATABASE_NAME with the proper Redshift values.
BUCKET_NAME
whereas the second permission applies only to the bucket’s contents — BUCKET_NAME/*
— an important distinction.transfer-service-policy
(this will be referenced in the next step), add a description, and click Create policy.transfer-role
, and click Create role.🚧 Alternative authentication method: AWS User with HMAC Access Key ID & Secret Access Key Role based authentication is the preferred authentication mode for Redshift based on AWS recommendations, however, HMAC Access Key ID & Secret Access Key is an alternative authentication method that can be used if preferred.
- Navigate to the IAM service page.
- Navigate to the Users navigation tab, and click Add users.
- Enter a User name for the service, for example,
transfer-service
, click Next. Under Select AWS access type, select the Access key - Programatic access option. Click Next: Permissions.- Click the Attach existing policies directly option, and search for the name of the policy created in the previous step. Select the policy, and click Next: Tags.
- Click Next: Review and click Create user.
- In the Success screen, record the Access key ID and the Secret access key.