Configure Data Source authentication

Data sources support multiple authentication methods to meet different security requirements. You can enable additional authentication methods for specific data source types to improve security and support enterprise authentication standards.

The benefits of enabling additional authentication methods include:

  • Security: Use OAuth, IAM, or certificate-based authentication for more secure connections

  • Flexibility: Support multiple authentication methods for different teams

  • Compliance: Meet enterprise security requirements with certificate authentication

This configuration helps you control which authentication methods are available for your organization’s data sources.

Prerequisites

  • The SysAdmin role in Domino

  • Knowledge of which authentication methods your organization requires

  • For OAuth, IAM, and certificate authentication: Additional configuration steps (see Related information)

Enable authentication methods

To enable additional authentication methods, you’ll add a configuration record that specifies which methods are available for your data source type.

Step 1: Open the configuration records

First, you’ll navigate to the configuration area where authentication settings are stored.

  1. In the Admin panel, go to Platform settings > Configuration records.

  2. Click Add Record.

Step 2: Add the authentication configuration

Next, you’ll specify which authentication methods to enable and set the default method.

  1. Add a key for your data source type. The Data Source Authentication section in the Configuration Records reference has a list of keys for your data source type.

  2. Enter the value as comma-separated authentication types.

    • Example for PostgreSQL with certificate support: certauth,basic,oauth

    • Example for IBM DB2 with basic only: basic

      Tip

      The first value becomes the default authentication method for all users. Put your preferred method first.

  3. Click Create.

Step 3: Complete additional setup (if needed)

Some authentication methods require extra configuration outside of this page.

If you enabled OAuth or IAM, complete the additional configuration steps. See Related information for OAuth and IAM setup instructions.

Note: OAuth-authenticated connections work for all execution types except Domino endpoints.