{"id":97232,"date":"2023-09-05T21:03:19","date_gmt":"2023-09-06T01:03:19","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=97232"},"modified":"2024-02-06T15:43:33","modified_gmt":"2024-02-06T20:43:33","slug":"integrate-with-amazon-redshift","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/integrate-with-amazon-redshift","title":{"rendered":"Integrate with Amazon Redshift"},"content":{"rendered":"\n
Use JumpCloud SAML Single Sign On (SSO) to give your users convenient but secure access to all their web applications with a single set of credentials. <\/p>\n\n\n\n
Read this article to learn how to configure the Amazon Redshift connector. <\/p>\n\n\n\n
Prerequisites<\/strong><\/p>\n\n\n\n Important Considerations<\/strong><\/p>\n\n\n\n Additional Considerations<\/strong><\/p>\n\n\n\n Before you begin to set up SSO with Amazon Redshift, decide on names for the resources involved in setup. <\/p>\n\n\n\n All names need to be lowercase. <\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n The DB Group Name needs to match the JumpCloud User Group name. <\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Learn more about the AWS side of this process<\/a>.<\/p>\n\n\n\n If this is a Bookmark Application, enter your sign-in URL in the Bookmark URL<\/strong> field.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n The SSO IdP URL<\/strong> is not editable after the application is created. You will have to delete and recreate the connector if you need to edit this field at a later time.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Metadata can also be downloaded from the Configured Applications<\/strong> list. Search for and select the application in the list and then click Export Metadata<\/strong> in the top right corner of the window.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n { Make sure to replace ACCOUNT_NUMBER<\/kbd> with your AWS account number. See Prerequisites on where to find this. For REGION<\/kbd>, replace it with the region that the Redshift is being deployed or is already in.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n\n
\n
<\/p><\/div>
\n
\n
<\/p><\/div>
\n
\n
\n
\n
<\/p><\/div>
Creating a new JumpCloud Application Integration<\/strong><\/h2>\n\n\n\n
\n
<\/p><\/div>
\n
<\/p><\/div>
\n
\n
Configuring the SSO Integration<\/strong><\/h2>\n\n\n\n
To configure JumpCloud 1 <\/strong><\/h3>\n\n\n\n
Create a Group of Users<\/strong><\/h4>\n\n\n\n
\n
Set Up the SAML Application<\/strong><\/h4>\n\n\n\n
\n
Download the JumpCloud metadata<\/strong> file<\/strong><\/h4>\n\n\n\n
\n
<\/p><\/div>
To configure AWS 1<\/strong><\/h3>\n\n\n\n
\n
To configure JumpCloud 2<\/strong><\/h3>\n\n\n\n
\n
To configure AWS 2<\/strong><\/h3>\n\n\n\n
Create a Security Group<\/strong><\/h4>\n\n\n\n
\n
Create an Access Policy<\/strong><\/h4>\n\n\n\n
\n
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Version”: “2012-10-17”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Statement”: [
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0{
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Sid”: “AllowGetClusterCreds”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Effect”: “Allow”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Action”: “redshift:GetClusterCredentials”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Resource”: [
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“arn:aws:redshift:REGION:ACCOUNT_NUMBER:dbuser:testcluster\/${redshift:DbUser}”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“arn:aws:redshift:REGION:ACCOUNT_NUMBER:dbname:testcluster\/testdb”
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0]
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0},
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0{
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Sid”: “AllowCreateClusterUser”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Effect”: “Allow”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Action”: “redshift:CreateClusterUser”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Resource”: “arn:aws:redshift:REGION:ACCOUNT_NUMBER:dbuser:testcluster\/${redshift:DbUser}”
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0},
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0{
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Sid”: “AllowJoinGroup”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Effect”: “Allow”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Action”: “redshift:JoinGroup”,
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0“Resource”: “arn:aws:redshift:REGION:ACCOUNT_NUMBER:dbgroup:testcluster\/redshift_dbgroup”
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0}
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0]
\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0}<\/p>\n<\/div><\/div>\n\n\n\n<\/p><\/div>
\n
Create a Role <\/strong><\/h4>\n\n\n\n
\n