Monday, September 22, 2025

Combine Tableau and PingFederate with Amazon Redshift utilizing AWS IAM Id Middle

The sequence of posts on single sign-on to Amazon Redshift with AWS IAM Id Middle (successor to AWS Single Signal-On) integration continues from our prior put up.

On this put up, we define a complete information for establishing single sign-on from Tableau desktop to Amazon Redshift utilizing integration with IAM Id Middle and PingFederate because the id supplier (IdP) with an LDAP based mostly information retailer, AWS Listing Service for Microsoft Energetic Listing.

Stipulations

You must have the next conditions:

  1. A PingFederate account that has an lively subscription. You want an admin position to arrange the applying on PingFederate. When you’re new to PingFederate, you may attain out to Ping Id Gross sales.
  2. A working PingFederate server.
  3. Amazon Redshift Serverless workgroup or a provisioned Amazon Redshift information warehouse.
  4. Obtain and set up the newest Redshift ODBC 2.X driver.
  5. Obtain and set up Tableau Desktop 2024.1 or later
  6. Set up Tableau Server 2023.3.9 or later. For Tableau Server set up, see Set up and Configure Tableau Server.

Answer overview

PingFederate occasion connects to IAM Id Middle utilizing SAML. The customers and teams in PingFederate are synced to IAM Id Middle utilizing an open customary SCIM. After you arrange SAML and SCIM, it is possible for you to to allow single sign-on to Amazon Redshift from the AWS Administration Console utilizing Amazon Redshift Question Editor v2. That is achieved by creating an Id Middle utility within the Amazon Redshift console.

To allow single sign-on to Amazon Redshift from exterior of AWS utilizing a third-party shopper like Tableau, you arrange a trusted token issuer token alternate utilizing OIDC customary.

Determine 1 : Answer overview for Tableau integration with Amazon Redshift utilizing IAM Id Middle and Ping Federate

The workflow, proven within the previous determine, contains the next steps:

  1. The consumer configures Tableau to entry Amazon Redshift utilizing IAM Id Middle authentication.
  2. On a consumer sign-in try, Tableau initiates a browser-based OAuth movement and redirects the consumer to the PingFederate check in web page to enter the sign-in credentials. Password validation is finished towards the AWS Managed Microsoft AD information retailer.
  3. On profitable authentication, PingFederate points an authentication token (ID and entry token) to Tableau.
  4. The Amazon Redshift driver then makes a name to the Amazon Redshift-enabled Id Middle utility and forwards the entry token.
  5. Amazon Redshift passes the token to Id Middle and requests an entry token.
  6. Id Middle verifies the token utilizing the OIDC discovery connection to the trusted token issuer and returns an Id Middle-generated entry token for a similar consumer. Within the previous determine, trusted token issuer (TTI) is the PingFederate server that Id Middle trusts to supply tokens that third-party functions like Tableau use to name AWS providers.
  7. Amazon Redshift then makes use of the token to acquire the consumer and group membership data from Id Middle.
  8. Tableau consumer will be capable to join with Amazon Redshift and entry information based mostly on the consumer and group membership returned from Id Middle. The consumer and group settings within the LDAP-based AWS Managed Microsoft AD information retailer for PingFederate are propagated to id heart utilizing SCIM protocol for outbound provisioning.

Walkthrough

On this walkthrough, you’ll use the next steps to construct the answer:

  1. SAML and SCIM arrange between PingFederate and IAM Id Middle
  2. Hook up with Amazon Redshift utilizing Question Editor v2
  3. Configure id federation from a third-party shopper
    1. Create an entry token supervisor and entry token mapping
    2. Create an OIDC coverage
    3. Create an OAuth shopper
    4. Arrange a PingFederate Authorization Server
    5. Coverage Contract Grant Mapping
    6. Accumulate PingFederate data
    7. Arrange a trusted token issuer in IAM Id Middle
    8. Arrange shopper connections and trusted token issuers in Amazon Redshift
    9. Configure Tableau OAuth config information for PingFederate to combine with Amazon Redshift utilizing IAM Id Middle
    10. Set up a Tableau OAuth config file on a shopper machine for Tableau Desktop
    11. Set up a Tableau OAuth config file for a web site on Tableau Server or Tableau Cloud
    12. Federate to Amazon Redshift from Tableau Desktop utilizing Id Middle
    13. Federate to Amazon Redshift from Tableau Server utilizing Id Middle authentication

SAML and SCIM arrange between PingFederate and IAM Id Middle

IAM Id Middle integration with PingFederate begins with SAML arrange adopted by SCIM.

  1. Arrange SAML 2.0 for SP Connection of kind Browser SSO (single sign-on) in PingFederate.
  2. Arrange SCIM 2.0 for outbound provisioning. It would sync the customers and teams created in an LDAP based mostly information retailer like AWS managed Microsoft AD for PingFederate to the customers and teams in IAM Id Middle.

The implementation for the cloud based mostly IdP choice PingOne will not be in scope of this put up and follows steps much like these described in Combine IdP with Amazon Redshift Question Editor v2 utilizing AWS IAM Id Middle for seamless Single Signal-On.

Additional particulars of SAML and SCIM arrange are as follows.

    1. Set up PingFederate Server.
    2. Arrange IAM Id heart integration by following the Ping documentation together with the obtain for Id Middle integration information.
      1. Deploy the mixing information to your PingFederate set up.
      2. Allow provisioning and configure IdP Browser SSO (SAML connection). (You possibly can implement Browser SSO connection solely utilizing IAM Id Middle metadata file.)
        1. Underneath System > Server > Protocol Settings > Federation Information BASE_URL discipline, use the publicly accessible totally certified area title of the PingFederate server.
        2. Create an LDAP based mostly information retailer (the title used on this instance is AWSManagedMSAD) as a result of SCIM 2.0 protocol for outbound provisioning solely works with LDAP based mostly information shops with PingFederate. In case you are utilizing a cloud-based answer like PinOne, you may arrange outbound provisioning in PingOne itself. Thus for this writing, now we have used AWS Managed Microsoft AD as a knowledge retailer created utilizing AWS Listing Service.
        3. Create a password credential validator (title used on this instance is awsmanagedmsadpassval) and IdP adapters (title used on this instance is awsmanagedmsadadapter) in your information retailer as relevant.
        4. Create an SP connection of kind Browser SSO utilizing the sp-saml-metadata.xml file as defined in making a provisioning connection.
      3. Export SAML metadata from PingFederate.
      4. Register PingFederate as an IdP in Id Middle.
      5. Navigate again to the connection saved in step b, and configure outbound provisioning.
    3. Allow provisioning in IAM Id Middle by following step 1 within the documentation.
    4. Then, configure provisioning in PingFederate by following step 2 within the documentation.
    5. Optionally, you may configure and cross consumer attributes from PingFederate for entry management in Id Middle.

Subsequent, connect with Amazon Redshift utilizing its native question editor, Question Editor v2, to validate AWS providers’ connectivity utilizing IAM Id Middle.

Hook up with Amazon Redshift utilizing Question Editor v2

Full the Walkthrough part of IAM Id Middle integration with Amazon Redshift, which can arrange your Amazon Redshift connectivity with Question Editor v2.

When you want additional assist with SAML and SCIM arrange, and connecting to Amazon Redshift utilizing Question Editor v2, you too can comply with step-by-step guided demo video single sign-on to Amazon Redshift with IAM IDC integration utilizing PingFederate with AWS Managed MSAD Demo

Configure id federation from a third-party shopper

Configure id federation enabled by IAM Id Middle from IdP PingFederate to the service supplier Amazon Redshift utilizing an exterior shopper like Tableau. The next steps within the PingFederate admin console and Id Middle information you thru the id federation course of.

Create an entry token supervisor and entry token mapping

To map PingFederate attributes to OAuth entry tokens and OpenID Join ID (OIDC) tokens, create an entry token supervisor and token mapping. For full particulars and arrange based mostly in your safety wants, see Token mapping in PingFederate, which explains entry token administration intimately. Full the next steps to create a token supervisor.

  1. Within the PingFederate administrative console, go to Purposes > OAuth > Entry Token Administration, and select Create New Occasion.
  2. In Sort tab,
    1. Enter an Occasion Identify and Occasion ID of your selection, for instance TrustedTokenIssuerMgr.
    2. Choose the Sort from drop down listing as JSON Net Tokens, generally referred to as JWT.
    3. Go away Dad or mum occasion as None and select Subsequent.
  3. In Occasion configuration tab,
    1. Underneath Certificates, choose Add a brand new row to ‘Certificates’, choose the certificates for token supervisor from the drop-down listing, enter a Key ID equivalent to certkey, and select Replace beneath Motion. You possibly can create a brand new certificates by navigating to Safety > Certificates & Key Administration > Signing & Decryption Keys & Certificates > Create New.
    2. Choose Use Centralized Signing Key.
    3. In JWS Algorithm, choose RSA utilizing SHA-256.
    4. Choose Allow Token Revocation. Go away every thing else as default and select Subsequent.
  4. Underneath Session Validation tab,
    1. Choose Embrace Session Identifier in Entry Token.
    2. Choose Verify for legitimate authentication session.
    3. Go away different selections as is and select Subsequent.
  5. Within the Entry Token Attribute Contract tab, depart the Topic Attribute Identify because the e default and proceed to Lengthen the Contract so as to add the next attribute and values.
    1. Enter aud, depart multi-value unchecked. Select Add beneath Motion.
    2. Repeat the identical to enter e mail, exp, iss, sub. When accomplished, select Subsequent.
  6. On every of Useful resource URIs and Entry Management tabs, depart as is and select Subsequent.
  7. On the Abstract tab, evaluate your adjustments and select Save. An occasion title with the title you supplied, like TrustedTokenIssuerMgr seems in Purposes > Oauth > Entry Token Administration.

Determine 2 : Entry Token Administration Configuration Abstract

  1. Navigate to Purposes > OAuth > Entry Token Mappings, choose the default Context and Entry Token SupervisorTrustedTokenIssuerMgr that was created within the earlier step. Select Add Mapping.
  2. Go away Attribute Sources & Person Lookup as is and select Subsequent.
  3. Underneath Contract Success tab,
    1. For Contract aud, choose Textual content from the Supply, and enter the Worth as AWSIdentityCenter.
    2. For Contract e mail, choose Persistent Grant from the Supply, and Worth as e mail.
    3. For Contract exp, choose Persistent Grant from the Supply, and Worth as EXPIRES_AT.
    4. For Contract iss, choose Textual content from the Supply, and enter your base URL because the Worth, like https://yourwebsite.area.com, the identical as in System > Server > Protocol Settings > BASE URL.
    5. For Attribute Contract sub, choose Persistent Grant from the Supply, and Worth as USER_KEY.
    6. Select on Subsequent.
  4. Go away Issuance Standards as is and select Subsequent.
  5. On the Abstract tab, evaluate all of your adjustments and select Save. A brand new default Context with Entry Token Supervisor if TrustedTokenIssuerMgr seems in Purposes > OAuth > Entry Token Mappings.

Determine 3: Entry Token Mappings Abstract

Create an OIDC coverage

For full particulars and arrange based mostly in your safety wants, see to Open ID join (OIDC) coverage administration in PingFederate. Full the next steps to arrange an OIDC coverage.

  1. Within the PingFederate administrative console, go to Purposes > OAuth > OpenID Join Coverage Administration, and select Add Coverage.
  2. Within the Handle Coverage tab,
    1. Enter the Coverage ID and Identify of your selection, for instance OIDCPolicy.
    2. Choose the Entry Token Supervisor from drop down listing created within the earlier part—TrustedTokenIssuerMgr.
    3. Choose Embrace Session Identifier in ID Token
    4. Choose Embrace Person Information in ID Token
    5. Choose Return ID Token on Refresh Grant
    6. Go away others as is and select Subsequent.
  3. Within the Attribute Contract tab, preserve solely the required attributes in prolonged contract and delete the others.
    1. Go away the sub attribute beneath Attribute Contract as is.
    2. Underneath Lengthen the contract, select delete for all attributes besides e mail. select Subsequent.
  4. Within the Attribute Scopes tab,
    1. Choose openid from the Scope listing.
    2. Choose e mail from Attributes.
    3. Select Add from Actions. Select Subsequent.
  5. Go away Attribute Sources & Person Lookup as is and select Subsequent.
  6. In Contract Success tab,
    1. For Attribute Contract e mail, choose Persistent Grant from the Supply, and Worth as e mail.
    2. For Attribute Contract sub, choose Persistent Grant from the Supply, and Worth as USER_KEY.
    3. Select Subsequent.
  7. Go away Issuance Standards as is and select Subsequent.
  8. On the Abstract tab, evaluate your adjustments and select Save. A coverage ID with the title you supplied, like OIDCPolicy, seems in Purposes > OauthOpenID Join Coverage Administration.

Determine 4 : OpenID Join Coverage Administration Abstract

Create OAuth shopper

For full particulars and arrange based mostly in your safety wants, see configure an OAuth shopper in PingFederate, which explains every discipline intimately. Full the next steps to create an OAuth shopper.

  1. Within the PingFederate administrative console, go to Purposes > OAuth > Shoppers, and select Add Shopper.
  2. Within the Shopper ID discipline, enter a singular, immutable shopper ID. We use tableauredshiftpingfed because the title on this instance.
  3. Enter a Identify and Description for the shopper.
  4. Choose a Shopper Authentication technique. You possibly can choose from NoneShopper TLS CertificatesPersonal Key JWT, or Shopper Secret. For this situation, choose Shopper Secret. Select Generate Secret to create a brand new one or use choose Change secret to create your personal.
  5. Go away Request object signing algorithm set to Enable Any. You possibly can override to make use of the algorithm of your selection if wanted.
  6. Within the Redirect URIs discipline, add every of the next values.
    1. http://localhost:8080/authorization-code/callback
    2. http://localhost:55556/Callback
    3. http://localhost:55557/Callback
    4. http://localhost:55558/Callback
    5. http://localhost/auth/add_oauth_token
  7. Choose Prohibit widespread scopes. Prohibit scopes by choosing the checkboxes for e mail, offline_access, openid, and profile as required.
  8. In Emblem URL, optionally enter the URL for emblem you wish to show on the Person Grant Authorization and Revocation pages.
  9. Within the Allowed Grant Varieties listing, you may select from a listing of authorization choices. On this instance, choose Authorization code. Optionally, you may choose Implicit, Refresh Token, and Shopper Credentials.
  10. Underneath Default entry token supervisor, choose the entry token supervisor TrustedTokenIssuerMgr created within the earlier part.
  11. Choose the Prohibit field for Prohibit to default entry token supervisor.
  12. Customise Persistent grants max lifetime to match your necessities. Set it to 12 hours for this instance by utilizing the third radio button.
  13. For Openid join, select your most popular ID token signing algorithm. Choose RSA utilizing SHA-256 for this instance. Optionally, for Coverage you may select the OIDC coverage created within the earlier part.
  14. Go away the remaining settings as default and select Save.

Determine 5 : OAuth Shopper Configuration

The Tableau Desktop redirect URLs ought to all the time use localhost. The next instance, additionally use localhost for the Tableau Server hostname to simplify testing in a take a look at atmosphere. For this setup, you must also entry the server at localhost within the browser. In a manufacturing atmosphere, or Tableau Cloud, it’s best to use the total hostname that your customers will use to entry Tableau on the net, together with HTTPS. If you have already got an atmosphere with HTTPS configured, you may skip the localhost configuration and use the total hostname from the beginning.

Arrange a PingFederate authorization server

For full particulars and arrange based mostly in your safety wants, see PingFederate authorization server settings in PingFederate. Full the next steps to configure an authorization server.

  1. Within the PingFederate administrative console, go to System > OAuth Settings > Authorization Server Settings, and make following adjustments.
  2. Go away the preliminary configurations as default and scroll all the way down to Persistent Grant Prolonged Attributes, add Attribute e mail.
  3. For OAuth Administrative Net Companies Settings, in Password Credential Validator, choose awsmanagedmsadpassval that you just created within the SAML and SCIM arrange part.
  4. For Persistent Grant Administration API,
    1. In Entry Token Supervisor, choose the TrustedTokenIssuerMgr created earlier.
    2. In Required Scope, choose openid.
  5. Go away remaining the settings as default and select Save.

Determine 6 : PingFederate Authorization Server Setting

Coverage contract grant mapping

For full particulars and arrange based mostly in your safety wants, see Grant contract mapping in PingFederate. For this illustration, we arrange a coverage contract grant mapping for authentication in a three-step course of.

Step 1: Create a coverage contract

  1. Within the PingFederate administrative console, go to Authentication > Insurance policies > Coverage Contracts, and select Create New Contract.
  2. In Contract Information tab, enter a reputation. For this instance, we use OIDCPolicyContract.
  3. In Contract Attributes tab, select Lengthen the Contract so as to add e mail attribute.
  4. Evaluate and select Save.

Determine 7 : Coverage Contract Abstract

Step 2: Add authentication coverage

  1. Within the PingFederate administrative console, go to Authentication > Insurance policies > Insurance policies, and select Add Coverage.
  2. Enter a coverage title. On this instance, we use OAuthOIDCPolicy.
  3. Within the Coverage drop down, choose IdP Adapter and choose the awsmanagedmsadadapter that you just created within the SAML and SCIM arrange part.
  4. Set FAIL to Completed and beneath SUCCESS, choose Coverage Contracts from the drop-down menu and choose the OIDCPolicyContract created in step 1. Select Completed.

Determine 8 : Authentication Coverage Configuration

Step 3: Coverage contract grant mapping

  1. Within the PingFederate administrative console, go to Authentication > OAuth > Coverage Contract Grant Mapping, and beneath Mappings, choose OIDCPolicyContract created in Step1 and select Add Mapping.
  2. On the Attribute Sources & Person Lookup tab, select Subsequent.
  3. Within the Contract Success tab,
    1. For Contract USER_KEY, choose Authentication Coverage Contract from the Supply, and Worth as topic.
    2. For Contract USER_NAME, choose Authentication Coverage Contract from the Supply, and Worth as topic.
    3. For Contract e mail, choose Authentication Coverage Contract from the Supply, and Worth as e mail.
    4. Select Subsequent.
  4. Go away Issuance Standards as is, evaluate and select Save.

Determine 9 : Coverage Contract Grant Mapping Abstract

Accumulate PingFederate data

To configure your PingFederate with IAM Id Middle and Amazon Redshift, gather the next parameters. When you don’t have these parameters, contact your PingFederate admin.

  1. Issuer URL, auth URL (authUri), and token URL (tokenUri).

You may get these values from the OIDC IdP URL: https://pingfedserver.instance.com/.well-known/openid-configuration. Open this URL in an online browser, changing pingfedserver.instance.com together with your IdP server title.

The next is an instance screenshot of IdP attributes utilizing OIDC IdP URL the place:

  • The issuer URL corresponds to the issuer
  • The auth URL (authUri) corresponds to authorization_endpoint
  • The token URL (tokenUri) corresponds to token_endpoint

Determine 10 : Screenshot of IdP Attributes

  1. Viewers worth

To get the Viewers worth from PingFederate, check in as an admin to PingFederate and navigate to the next path to get the viewers worth that you just created throughout entry token mapping creation in PingFederate:

Purposes > OAuth > Entry Token Mappings > TrustedTokenIssuerMgr → Abstract > aud

Determine 11 : Entry Token Mapping

Arrange a trusted token issuer in IAM Id Middle

Change from the PingFederate console to the IAM Id Middle console for the AWS facet of configuration. Begin by including a trusted token issuer (TTI), which makes it potential to authorize Tableau to make requests on behalf of their customers to entry information in Amazon Redshift. A TTI is an OAuth 2.0 authorization server that points tokens to functions that provoke requests (requesting functions). The tokens authorize these functions to provoke requests on behalf of their customers to a receiving utility (an AWS service). On this step, you create a TTI within the central administration account. To create a TTI,

  1. Open the AWS Administration Console and navigate to IAM Id Middle, after which to the Settings web page.
  2. Choose the Authentication tab and beneath Trusted token issuers, select Create trusted token issuer.
  3. On the Arrange an exterior IdP to situation trusted tokens web page, beneath Trusted token issuer particulars, do the next:
    • For Issuer URL, enter the OIDC discovery URL of the exterior IdP that may situation tokens for trusted id propagation. You may get issuer the URL as talked about in step 1 of the previous part Accumulate PingFederate data.
  4. For Trusted token issuer title, enter a reputation to establish this TTI in Id Middle and within the utility console.
  5. Underneath Map attributes, do the next:
    1. For the id supplier attribute, choose an attribute from the listing to map to an attribute within the Id Middle id retailer. You possibly can choose E-mail, Object Identifier, Topic, and Different.
    2. For Id Middle attribute, choose the corresponding attribute for the attribute mapping.
  6. Underneath Tags (non-compulsory), select Add new tag, enter a price for Key, and optionally for Worth. For details about tags, see Tagging AWS IAM Id Middle sources.

The next determine reveals the arrange for TTI:

Determine 12 : Configuring Trusted Token Issuer

Arrange shopper connections and trusted token issuers in Amazon Redshift

On this step, the Amazon Redshift functions that alternate externally generated tokens should be configured to make use of the TTI you created within the earlier step. Additionally, the viewers declare (or aud declare) from PingFederate should be specified. On this instance, you might be configuring the Amazon Redshift utility within the member account the place the Amazon Redshift cluster or serverless occasion exists.

  1. Choose IAM Id Middle connection from the Amazon Redshift console menu.
  2. Choose the Amazon Redshift utility that you just created as a part of the conditions.
  3. Choose the Shopper connections tab and select Edit.
  4. Select Sure beneath Configure shopper connections that use third-party IdPs.
  5. Choose the checkbox for Trusted token issuer that you just created within the earlier part.
  6. Enter the Aud declare worth beneath Configure chosen trusted token issuers. For instance, AWSIdentityCenter. You may get the viewers worth from the PingFederate path: Purposes > OAuth > Entry Token Mappings > TrustedTokenIssuerMgr > Abstract > aud.
  7. Select Save.

Determine 13 : Configure Viewers Worth in Amazon Redshift

At this level, your IAM Id Middle, Amazon Redshift, and PingFederate configuration are full. Subsequent, you could configure Tableau.

Configure Tableau OAuth config information for PingFederate to combine with Amazon Redshift utilizing IAM Id Middle

This XML file used on this part shall be used for all of the Tableau merchandise like Tableau Desktop, Server and Cloud.

To combine Tableau with Amazon Redshift utilizing IAM Id Middle, you could use a customized XML file. On this step, you’ll use the next XML and substitute the values beginning with a $ signal and highlighted in daring. The remainder of the values could be saved as it’s or you may modify them based mostly in your particular wants. For detailed data on every of the weather within the file, see the Tableau documentation on GitHub.

You may get authUri and tokenUri as talked about in step 1 of previous part, Accumulate PingFederate data.

    redshift   custom_redshift_pingfed         http://localhost:55556/Callback   http://localhost:55557/Callback   http://localhost:55558/Callback   https://.com/as/authorization.oauth2   https://.com/as/token.oauth2   openid   e mail   profile   offline_access               OAUTH_CAP_FIXED_PORT_IN_CALLBACK_URL       true                 OAUTH_CAP_PKCE_REQUIRES_CODE_CHALLENGE_METHOD       true                 OAUTH_CAP_REQUIRE_PKCE       true                 OAUTH_CAP_SUPPORTS_STATE       true                 OAUTH_CAP_CLIENT_SECRET_IN_URL_QUERY_PARAM       true                 OAUTH_CAP_SUPPORTS_GET_USERINFO_FROM_ID_TOKEN       true                       ACCESSTOKEN       access_token                 REFRESHTOKEN       refresh_token                 id-token       id_token                 access-token-issue-time       issued_at                 access-token-expires-in       expires_in                 username       e mail         

The next is the instance XML:

    redshift   custom_redshift_pingfed   tableauredshiftpingfed      http://localhost:55556/Callback   http://localhost:55557/Callback   http://localhost:55558/Callback   https://pingfedserver.instance.com/as/authorization.oauth2   https://pingfedserver.instance.com/as/token.oauth2   openid   e mail   profile   offline_access               OAUTH_CAP_FIXED_PORT_IN_CALLBACK_URL       true                 OAUTH_CAP_PKCE_REQUIRES_CODE_CHALLENGE_METHOD       true                 OAUTH_CAP_REQUIRE_PKCE       true                 OAUTH_CAP_SUPPORTS_STATE       true                 OAUTH_CAP_CLIENT_SECRET_IN_URL_QUERY_PARAM       true                 OAUTH_CAP_SUPPORTS_GET_USERINFO_FROM_ID_TOKEN       true                       ACCESSTOKEN       access_token                 REFRESHTOKEN       refresh_token                 id-token       id_token                 access-token-issue-time       issued_at                 access-token-expires-in       expires_in                 username       e mail         

Set up Tableau OAuth config file on a shopper machine for Tableau Desktop

After the XML configuration file is created, it ought to be copied to a particular location for use by Amazon Redshift Connector from Tableau Desktop. Save the previous file as .xml and put it aside beneath DocumentsMy Tableau RepositoryOAuthConfigs.

Notice: Presently this integration will not be supported in macOS as a result of the Amazon Redshift ODBC 2.X Driver will not be supported but for MAC.

Set up Tableau OAuth config file for a web site on Tableau Server or Tableau Cloud

To combine with Amazon Redshift utilizing IAM Id Middle authentication, you could set up the Tableau OAuth config file in Tableau Server or Tableau Cloud.

  1. Register to the Tableau Server or Tableau Cloud utilizing admin credentials.
  2. Navigate to Settings.
  3. Go to OAuth Shoppers Registry and choose Add OAuth Shopper.
  4. Select the next settings:
    1. Connection kind: Choose Amazon Redshift.
    2. OAuth Supplier: Choose Custom_IdP.
    3. Shopper ID: Enter your IdP shopper ID worth.
    4. Shopper Secret: Enter your shopper secret worth.
    5. Redirect URL: Enter the worth as http://localhost/auth/add_oauth_token. On this put up, we’re utilizing localhost for testing within the native atmosphere. You must ideally use the total hostname with https.
    6. Select OAuth Config File: Choose the XML file that you just configured in Configure Tableau Desktop.
    7. Choose Add OAuth Shopper and select Save.

Determine 14: Create an OAuth connection in Tableau Server or Cloud

Federate to Amazon Redshift from Tableau Desktop utilizing IAM Id Middle

Now, you’re prepared to attach from Tableau and federated sign-in utilizing IAM Id Middle authentication. On this step, you’ll create a Tableau Desktop report and publish it to Tableau Server.

  1. Open Tableau Desktop.
  2. Select Amazon Redshift Connector and enter the next values:
    1. Server: Enter the title of the server that hosts the database and the title of the database you wish to connect with.
    2. Port: Enter 5439.
    3. Database: Enter your database title. On this instance, we use dev.
    4. Authentication: Choose OAuth.
    5. Federation Sort: Choose Id Middle
    6. Id Middle Namespace: You possibly can depart this clean.
    7. OAuth Supplier: This worth ought to robotically be pulled out of your configured XML. It will likely be the worth from the component oauthConfigId.
    8. Choose checkbox for Require SSL.
  3. Select Signal-In.
  4. A browser pop-up will provoke the place you’ll enter your IdP credentials.

Determine 15: Tableau Desktop OAuth connection

  1. When authentication is profitable, you will notice the message Tableau created this window to authenticate. It’s now secure to shut it.

Determine 16: Profitable authentication utilizing Tableau

Congratulations! You might be signed in utilizing the IAM Id Middle integration with Amazon Redshift and are able to discover and analyze your information utilizing Tableau Desktop.

Determine 17: Profitable connection utilizing Tableau Desktop

The next is a screenshot from Amazon Redshift system desk (sys_query_history) exhibiting that consumer Ethan from PingFederate is accessing the gross sales report.

Determine 18: Person audit in sys_query_history

Now you may create your personal Tableau Report on the desktop model and publish it to your Tableau Server. For the following part, you create and publish a report named Account Stage Gross sales.

Federate to Amazon Redshift from Tableau Server utilizing IAM Id Middle authentication

After you may have revealed the report from Tableau Desktop to Tableau Server, check in as non-admin consumer and consider the revealed report utilizing IAM Id Middle authentication.

  1. Register to the Tableau Server web site as a non-admin consumer.
  2. Navigate to Discover and go to the folder the place your revealed report is saved.
  3. Choose the report and select Signal In.

Determine 19: Signal In Immediate on Tableau Cloud/Server

  1. Enter your PingFederate credentials to the browser pop-up to authenticate.
  2. After profitable authentication, you may entry the info and create experiences.

Determine 20: Tableau report

Clear up

Full the next steps to wash up your sources:

  1. Delete the IdP functions that you just created to combine with IAM Id Middle.
  2. Delete Id Middle configuration.
  3. Delete the Amazon Redshift utility and the Amazon Redshift provisioned cluster or Serverless occasion that you just created for testing.
  4. Delete the IAM position and IAM coverage that you just created for Id Middle and Amazon Redshift integration.
  5. Delete the permission set from Id Middle that you just created for Amazon Redshift Question Editor v2 within the administration account.
  6. Clear up sources associated to PingFederate.

Conclusion

This put up coated streamlining entry administration for information analytics by utilizing Tableau’s functionality to assist single sign-on based mostly on the OAuth 2.0 and OIDC protocol. This setup facilitates federated consumer authentication, the place consumer identities from an exterior id supplier like PingFederate are trusted and propagated to Amazon Redshift. You walked by means of the steps to configure Tableau Desktop and Tableau Server to combine seamlessly with Amazon Redshift utilizing AWS IAM Id Middle for single sign-on. By harnessing this integration of a third-party IdP with IAM Id Middle, analysts can securely entry Amazon Redshift information sources inside Tableau with out managing separate database credentials.

Be taught extra about Amazon Redshift integration with IAM Id Middle utilizing PingFederate as an id supplier by visiting the next sources.


Concerning the authors

Rohit Vashishtha

Rohit Vashishtha

Rohit is a Senior Analytics Specialist Options Architect at AWS based mostly in Dallas, Texas. He has 20 years of expertise architecting, constructing, main, and sustaining huge information platforms. Rohit helps clients modernize their analytic workloads utilizing the breadth of AWS providers and ensures that clients get the perfect worth/efficiency with utmost safety and information governance.

Maneesh Sharma

Maneesh Sharma

Maneesh is a Database Modernization ProServ Marketing consultant at AWS with 15 years of expertise designing and implementing large-scale information warehouse and analytics options. He works intently with clients to assist them modernize their legacy functions to AWS cloud-based platforms.

Jared Warren

Jared Warren

Jared is a Principal Options Architect at Amazon Net Companies, working with our Enterprise clients. Outdoors of labor, he performs board video games (the nerdier the higher) and smokes bar-b-que in his yard.

Jason Veinot

Jason Veinot

Jason is a Senior Options Architect at Ping Id with greater than 20 years’ expertise in IT and cybersecurity. He makes a speciality of Id and Entry Administration (IAM), pairing deep infrastructure and cloud experience with hands-on management to design and ship fashionable id options. Jason companions with main expertise suppliers to speed up outcomes and assist organizations obtain their distinctive IAM objectives.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles