Securing Connections
Connections require sensitive information, such as user names or passwords, to access data in external systems.
To ensure that this sensitive information is not compromised, use roles and permissions to secure connection objects and use credential stores or runtime resources to secure connection values.
Secure Connection Objects
To secure connection objects, use roles and permissions as follows:
- Grant a small set of DevOps engineers the Connection Editor role and Write permission on connections. With this access, a user has full access to connection objects. The user can create and edit connections in the Connections view.
- Grant data engineers who design pipelines the Connection User role and Read permission on connections. With this access, a user can select the connection name when configuring a pipeline or fragment, but cannot view the connection values.
For more information, see Roles and Permissions.
Secure Connection Values
To secure connection values, use one of the following methods when you define connection properties:
- Credential stores
- To use credential stores, you add the sensitive values as secrets in an external credential store system, such as AWS Secrets Manager or Azure Key Vault. Then you use credential functions in connection properties to retrieve those values.
- Runtime resources
- To use runtime resources, you define runtime resources in a file that is locally stored on Data Collector or Transformer, and then you call the resources from connection properties.
Tip: To more securely define sensitive values, use credential stores.