When specifying the AccessKey and SecretKey of an AWS root user.įor users and roles that require Multi-factor Authentication, specify the MFASerialNumber and MFAToken connection properties. If you are connecting to AWS (instead of already being connected such as on an EC2 instance), you mustĪdditionally specify the AccessKey and SecretKey of an IAM user to assume the role for. This will cause the CData Data Provider for Amazon Athena 2018 to attempt to retrieve credentials for In many situations it may be preferable to use an IAM role for authentication instead of the direct security credentials of an AWS root user.Īn AWS role may be used instead by specifying the RoleARN. The CData Data Provider for Amazon Athena 2018 will automatically obtain your IAM Role credentials and authenticate with them. To do so, set UseEC2Roles to true and leave AccessKey and SecretKey empty. If you are using the CData Data Provider for Amazon Athena 2018 from an EC2 Instance and have an IAM Role assigned to the instance, you can use the Click Continue to Security Credentials and expand the Access Keys section to manage or create root account access keys.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |