Use JumpCloud SAML Single Sign On (SSO) to give your users convenient but secure access to all their web applications with a single set of credentials. <\/p>\n\n\n\n
Read this article to learn how to configure the Amazon Redshift connector. <\/p>\n\n\n\n
Prerequisites<\/strong><\/p>\n\n\n\n
Important Considerations<\/strong><\/p>\n\n\n\n
Additional Considerations<\/strong><\/p>\n\n\n\n
Before you begin to set up SSO with Amazon Redshift, decide on names for the resources involved in setup. <\/p>\n\n\n\n
<\/p><\/div>
All names need to be lowercase. <\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
<\/p><\/div>
<\/p><\/div>
The DB Group Name needs to match the JumpCloud User Group name. <\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
Learn more about the AWS side of this process<\/a>.<\/p>\n\n\n\n
<\/p><\/div>
If this is a Bookmark Application, enter your sign-in URL in the Bookmark URL<\/strong> field.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
<\/p><\/div>
The SSO IdP URL<\/strong> is not editable after the application is created. You will have to delete and recreate the connector if you need to edit this field at a later time.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
<\/p><\/div>
Metadata can also be downloaded from the Configured Applications<\/strong> list. Search for and select the application in the list and then click Export Metadata<\/strong> in the top right corner of the window.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
{
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Version”: “2012-10-17”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Statement”: [
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0{
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Sid”: “AllowGetClusterCreds”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Effect”: “Allow”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Action”: “redshift:GetClusterCredentials”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Resource”: [
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“arn:aws:redshift:REGION:ACCOUNT_NUMBER:dbuser:testcluster\/${redshift:DbUser}”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“arn:aws:redshift:REGION:ACCOUNT_NUMBER:dbname:testcluster\/testdb”
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0]
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0},
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0{
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Sid”: “AllowCreateClusterUser”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Effect”: “Allow”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Action”: “redshift:CreateClusterUser”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Resource”: “arn:aws:redshift:REGION:ACCOUNT_NUMBER:dbuser:testcluster\/${redshift:DbUser}”
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0},
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0{
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Sid”: “AllowJoinGroup”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Effect”: “Allow”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Action”: “redshift:JoinGroup”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Resource”: “arn:aws:redshift:REGION:ACCOUNT_NUMBER:dbgroup:testcluster\/redshift_dbgroup”
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0}
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0]
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0}<\/p>\n<\/div><\/div>\n\n\n\n
<\/p><\/div>
Make sure to replace ACCOUNT_NUMBER<\/kbd> with your AWS account number. See Prerequisites on where to find this. For REGION<\/kbd>, replace it with the region that the Redshift is being deployed or is already in.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
{<\/p>\n\n\n\n
“Version”: “2012-10-17”,<\/p>\n\n\n\n
“Statement”: [<\/p>\n\n\n\n
{<\/p>\n\n\n\n
“Effect”: “Allow”,<\/p>\n\n\n\n
“Principal”: {<\/p>\n\n\n\n
“Federated”: “arn:aws:iam::ACCOUNT_NUMBER:saml-provider\/redshift-sso”<\/p>\n\n\n\n
},<\/p>\n\n\n\n
“Action”: “sts:AssumeRoleWithSAML”,<\/p>\n\n\n\n
“Condition”: {<\/p>\n\n\n\n
“StringEquals”: {<\/p>\n\n\n\n
“SAML:aud”: “http:\/\/localhost:7890\/redshift\/””<\/p>\n\n\n\n
}<\/p>\n\n\n\n
}<\/p>\n\n\n\n
}<\/p>\n\n\n\n
]<\/p>\n\n\n\n
}<\/p>\n\n\n\n
In the SQL Client, you have three phases to complete:<\/p>\n\n\n\n
<\/p><\/div>
Later versions of the Redshift JDBC driver might have the Class Name as com.amazon.redshift.jdbc42.Driver. See https:\/\/docs.aws.amazon.com\/redshift\/latest\/mgmt\/configure-jdbc-connection.html<\/a> for more information.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
<\/p><\/div>
The Redshift cluster is local to the VPC and uses a VPN access to connect the VPC to the redshift JDBC url that maps to a private IP. <\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n
Users are implicitly denied access to applications. After you connect an application to JumpCloud, you need to authorize user access to that application. You can authorize user access from the Application Configuration<\/strong> panel or from the Groups Configuration<\/strong> panel. <\/p>\n\n\n\n
To learn how to authorize user access from the Groups Configuration<\/strong> panel, see Authorize Users to an SSO Application<\/a>.<\/p>\n\n\n\n