Is the current version working well with Redshift serverless with OKTA (BrowserSamlCredentialsProvider)? #153
Unanswered
radoslawkosinski
asked this question in
Q&A
Replies: 1 comment 1 reply
-
Hi @radoslawkosinski, is the Okta SAML assertion configured with a "Preferred Role"? If so, this role is likely provided in the SAML response redshift-connector receives from Okta, and uses for authentication with boto3. Additionally you can check if the database user is provided in the SAML assertion. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
We are trying to use redshift_connector(Redshift Python Driver 2.0.910 and latest boto3) with redshift serverless and OKTA.
Previously we had no issues with redshift provisioned but on serverless for some reeason, the session is established with the IAM role ('IAMR:') instead of the logged in user('select current_user;'). Are there any restrictions or special considerations with current version and servberless + OKTA?
Beta Was this translation helpful? Give feedback.
All reactions