Prerequisites
Before establishing a connection, the following prerequisites are required:
Driver Details
Whitelisting IP address and Port
Service Account User Permissions
Environmental Variables
Credential Manager
Driver Details
Drivers are required to enable communication between the data source and the application. The type of driver depends on the data source and can include SDKs, JDBC drivers, or other proprietary formats.
Location: Drivers are packaged and deployed within the application artifacts.
Whitelisting IP Address and Port
To ensure a secure and uninterrupted connection between the application and the data source, whitelist the application's IP address and port in the data source's firewall or network configuration. This prevents connection issues, secures the connection, and protects data from unauthorized access.
Service Account User Permissions
Service account user permissions are used to connect to the data source with defined permissions to crawl metadata, profile data, and build the lineage.
Connector Environment
Each environment has a specific purpose (For reference only):
Development (DEV): For building and testing new features.
Quality Assurance (QA): For testing by QA teams.
Staging (STG): For pre-production testing.
Production (PROD): Live environment.
Temporary: For short-term use, like schema comparison or upgrade checks.
Steps to Configure the Environment:
Go to Administration > System Settings.
Select the Connector tab.
Find the key connector.environment.
Add values like PROD, STG, QA, etc., in the Value column.
Click the Save button.
Saved environments will now appear in the environment drop-down on the Add Connector page.
Credential Manager
Credential managers store and manage authentication details for data connectors. Four types are supported, each designed to securely hold sensitive information such as passwords, tokens, certificates, and API keys. Credentials are fetched in real time during connection attempts to ensure enhanced security and compliance.
Supported Credential Managers
Database
Stores credentials such as username/password, tokens, API keys, and certificates.
Saves credential details in an encrypted format within the application database.
Used when credentials are managed directly inside the installed platform environment.
Suitable for storing credentials for websites, applications, or networks.
AWS Secrets Manager
Centralized credential storage with built-in encryption and secret rotation.
Uses encryption keys to generate and manage secrets.
Supports automatic rotation of credentials.
Credentials stored here are used to access data sources securely.
HashiCorp Vault
Identity-based secret management and encryption system.
Protects tokens, passwords, certificates, and encryption keys.
Uses a key-value store to manage secrets.
Offers strong access control and data protection mechanisms.
Azure Key Vault
Provides secure storage for sensitive data, including passwords, API keys, certificates, and tokens.
Ensures strict access control with permission-based retrieval.
Designed for high security and regulatory compliance.
Copyright © 2025, OvalEdge LLC, Peachtree Corners GA USA
Last updated
Was this helpful?

