Data sources support multiple authentication methods to meet different security requirements. You can enable additional authentication methods for specific data source types to improve security and support enterprise authentication standards.
The benefits of enabling additional authentication methods include:
-
Security: Use OAuth, IAM, or certificate-based authentication for more secure connections
-
Flexibility: Support multiple authentication methods for different teams
-
Compliance: Meet enterprise security requirements with certificate authentication
This configuration helps you control which authentication methods are available for your organization’s data sources.
To enable additional authentication methods, you’ll add a configuration record that specifies which methods are available for your data source type.
Step 2: Add the authentication configuration
Next, you’ll specify which authentication methods to enable and set the default method.
-
Add a key for your data source type. The Data Source Authentication section in the Configuration Records reference has a list of keys for your data source type.
-
Enter the value as comma-separated authentication types.
-
Example for PostgreSQL with certificate support:
certauth,basic,oauth -
Example for IBM DB2 with basic only:
basicTipThe first value becomes the default authentication method for all users. Put your preferred method first.
-
-
Click Create.
Step 3: Complete additional setup (if needed)
Some authentication methods require extra configuration outside of this page.
If you enabled OAuth or IAM, complete the additional configuration steps. See Related information for OAuth and IAM setup instructions.
Note: OAuth-authenticated connections work for all execution types except Domino endpoints.
