Support IAM role chaining for IAM authentication #128
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
The change allows client to configure one or more AWS IAM roles to be assumed before using IAM authentication to connect to a Redshift instance.
Motivation and Context
Sometimes 3rd-party clients like BI tools are not deployed in the same AWS account as the Redshift they should connect to. To allow them to use IAM authentication to connect to the Redshift instance, they need to assume the AWS account of the Redshift cluster first. The setup looks like this:
AWS account A:
role_a
which allows togetCredentials
for the Redshift instance and a trust relationship torole_b
AWS account B:
role_b
which is allowed to assumerole_a
role_b
With the new plugin, the connection to Redshift inside the BI tool can be configured to assume
role_a
first to make the IAM authentication work.Testing
The plugin has been tested in the above setup.
Screenshots (if appropriate)
Types of changes
Checklist
mvn install
succeedsLicense