Configuring a Connection
After Installing the Connector you can connect and create a Data Source for data in PostgreSQL.
Setting Up a Data Source
Complete the following steps to connect to the data:
- Under Connect | To a Server, click More....
- Select the data source called PostgreSQL by CData.
- Enter the information required for the connection.
- Click Sign In.
- If necessary, select a Database and Schema to discover what tables and views are available.
Using the Connection Builder
The connector makes the most common connection properties available directly in Tableau. However, it can be difficult to use if you need to use more advanced settings or need to troubleshoot connection issues. The connector includes a separate connection builder that allows you to create and test connections outside of Tableau.
There are two ways to access the connection builder:
- On Windows, use a shortcut called Connection Builder in the Start menu, under the CData Tableau Connector for PostgreSQL folder.
- You can also start the connection builder by going to the driver install directory and running the .jar file in the lib directory.
In the connection builder, you can set values for connection properties and click Test Connection to validate that they work. You can also use the Copy to Clipboard button to save the connection string. This connection string can be given to the Connection String option included in the connector connection window in Tableau.
Connecting to PostgreSQL
The following connection properties are usually required to connect to PostgreSQL.
- Server: The host name or IP of the server hosting the PostgreSQL database.
- User: The user which will be used to authenticate with the PostgreSQL server.
You can also optionally set the following:
- Database: The database to connect to when connecting to the PostgreSQL Server. If this is not set, the user's default database will be used.
- Port: The port of the server hosting the PostgreSQL database. 5432 by default.
Standard
Unless you select another scheme, Password is the default authentication mechanism the connector uses to connect to PostgreSQL Server.To use standard authentication, set the AuthScheme to Password to connect to PostgreSQL with login credentials.
Then, to authenticate, set the Password associated with the authenticating user.
pg_hba.conf Auth Schemes
There are subtypes of the Password authentication scheme supported by the connector which must be enabled in the pg_hba.conf file on the PostgreSQL server.
See the PostgreSQL documentation for more information about authentication setup on the PostgreSQL Server.
MD5
The connector can authenticate by verifying the password with MD5. This authentication method must be enabled by setting the auth-method in the pg_hba.conf file to md5.
SASL
The connector can authenticate by verifying the password with SASL (particularly, SCRAM-SHA-256). This authentication method must be enabled by setting the auth-method in the pg_hba.conf file to scram-sha-256.
Azure
Methods available for connecting to PostgreSQL with Microsoft Azure include:
- Azure Active Directory OAuth
- Azure Active Directory Password
- Azure Active Directory MSI
Azure AD
Azure AD is Microsoft’s multi-tenant, cloud-based directory and identity management service. It is user-based authentication that requires that you set AuthScheme to AzureAD.Authentication to Azure AD over a Web application always requires the creation of a custom OAuth application. For details, see Creating an Azure AD Application.
Desktop Applications
CData provides an embedded OAuth application that simplifies connection to Azure AD from a Desktop application.You can also authenticate from a desktop application using a custom OAuth application. (For further information, see Creating an Azure AD Application.) To authenticate via Azure AD, set these parameters:
- AuthScheme: AzureAD.
-
Custom applications only:
- OAuthClientId: The client Id assigned when you registered your custom OAuth application.
- OAuthClientSecret: The client secret assigned when you registered your custom OAuth application.
- CallbackURL: The redirect URI you defined when you registered your custom OAuth application.
When you connect, the connector opens PostgreSQL's OAuth endpoint in your default browser. Log in and grant permissions to the application.
The connector completes the OAuth process, obtaining an access token from PostgreSQL and using it to request data. The OAuth values are saved in the path specified in OAuthSettingsLocation. These values persist across connections.
When the access token expires, the connector refreshes it automatically.
Note: Azure PostgreSQL Flexible servers are not supported. Only Azure PostgreSQL Single Server instances are supported.
Ensure that an Active Directory admin has been set in the Azure PostgreSQL instance (Active Directory admin -> Set admin).
Next, set the following to connect:
- User: Set this to the Azure Active Directory user you granted access to the Azure PostgreSQL server.
- AzureTenant: Set this to the Directory (tenant) ID, found on the Overview page of the OAuth app used to authenticate to PostgreSQL on Azure.
- Server: Set this to the Server name of the Azure PostgreSQL server, found on the Overview page of the Azure PostgreSQL instance.
- Database: Set this to the database you'd like to connect to on the Azure PostgreSQL instance.
- Port: The port of the server hosting the PostgreSQL database. 5432 by default.
- InitiateOAuth: Set this to GETANDREFRESH.
- OAuthClientId: Set this to the Application (client) ID, found on the Overview page of the OAuth app used to authenticate to PostgreSQL on Azure.
- OAuthClientSecret: Set this to the Value of the client secret, generated at the Certificates and secrets page of the authenticating OAuth app.
- CallbackURL: Set this to the Redirect URI you specified during the creation of your OAuth app.
EC2 Instances
Set AuthScheme to AwsEC2Roles.
If you are using the connector from an EC2 Instance and have an IAM Role assigned to the instance, you can use the IAM Role to authenticate. Since the connector automatically obtains your IAM Role credentials and authenticates with them, it is not necessary to specify AWSAccessKey and AWSSecretKey.
If you are also using an IAM role to authenticate, you must additionally specify the following:
- AWSRoleARN: Specify the Role ARN for the role you'd like to authenticate with. This will cause the connector to attempt to retrieve credentials for the specified role.
- AWSExternalId (optional): Only required if you are assuming a role in another AWS account.
IMDSv2 Support
The PostgreSQL connector now supports IMDSv2. Unlike IMDSv1, the new version requires an authentication token. Endpoints and response are the same in both versions.
In IMDSv2, the PostgreSQL connector first attempts to retrieve the IMDSv2 metadata token and then uses it to call AWS metadata endpoints. If it is unable to retrieve the token, the connector reverts to IMDSv1.
Azure Password
Set AuthScheme to AzurePassword.
To connect using your Azure credentials directly, specify the following connection properties:
- AuthScheme: Set this to AzurePassword.
- User: Set this to your user account you use to connect to Azure.
- Password: Set this to the password you use to connect to Azure.
- AzureTenant: Set this to the Directory (tenant) ID, found on the Overview page of the OAuth app used to authenticate to PostgreSQL on Azure.
- Server: Set this to the Server name of the Azure PostgreSQL server, found on the Overview page of the Azure PostgreSQL instance.
- Database: Set this to the database you'd like to connect to on the Azure PostgreSQL instance.
- Port: The port of the server hosting the PostgreSQL database. 5432 by default.
GCP Service Account
To authenticate to your PostgreSQL Google SQL Cloud Instance using a service account, you must create a new service account and have a copy of the accounts certificate. If you do not already have a service account, you can create one by following the procedure in Creating an Azure AD Application. For a JSON file, set these properties:- AuthScheme: Set this to GCPServiceAccount.
- InitiateOAuth: Set this to GETANDREFRESH.
- OAuthJWTCertType: Set this to GOOGLEJSON.
- OAuthJWTCert: Set this to the path to the .json file provided by Google.
- OAuthJWTSubject: (optional) Only set this value if the service account is part of a GSuite domain and you want to enable delegation. The value of this property should be the email address of the user whose data you want to access.
For a PFX file, set these properties instead:
- AuthScheme: Set this to GCPServiceAccount.
- InitiateOAuth: Set this to GETANDREFRESH.
- OAuthJWTCertType: Set this to PFXFILE.
- OAuthJWTCert: Set this to the path to the .pfx file provided by Google.
- OAuthJWTCertPassword: (optional) Set this to the .pfx file password. In most cases you must provide this since Google encrypts PFX certificates.
- OAuthJWTCertSubject: (optional) Set this only if you are using a OAuthJWTCertType which stores multiple certificates. Should not be set for PFX certificates generated by Google.
- OAuthJWTIssuer: Set this to the email address of the service account. This address will usually include the domain iam.gserviceaccount.com.
- OAuthJWTSubject: (optional) Only set this value if the service account is part of a GSuite domain and you want to enable delegation. The value of this property should be the email address of the user whose data you want to access.
Managed Service Identity (MSI)
If you are running PostgreSQL on an Azure VM and want to leverage MSI to connect, set AuthScheme to AzureMSI.
User-Managed Identities
To obtain a token for a managed identity, use the OAuthClientId property to specify the managed identity's "client_id".When your VM has multiple user-assigned managed identities, you must also specify OAuthClientId.
Amazon Web Services
Obtain AWS Keys
To obtain the credentials for an IAM user:- Sign into the IAM console.
- In the navigation pane, select Users.
- To create or manage the access keys for a user, select the user and then go to the Security Credentials tab.
- Sign into the AWS Management console with the credentials for your root account.
- Select your account name or number.
- In the menu that displays, select My Security Credentials.
- To manage or create root account access keys, click Continue to Security Credentials and expand the "Access Keys" section.
AWS IAM Roles
Set AuthScheme to AwsIAMRoles.
In many situations, it may be preferable to use an IAM role for authentication instead of the direct security credentials of an AWS root user. If you are specifying the AWSAccessKey and AWSSecretKey of an AWS root user, you may not use roles.
To authenticate as an AWS role, set these properties:
- AuthScheme: Set this to AwsIAMRoles.
- User: Set this to the AWS-hosted PostgreSQL user that you granted the aws_iam role to. This user should map to an AWS user that has a role containing a policy which includes the rds-db:connect permission.
- AWSRoleARN: Specify the Role ARN for the role attached to the authenticating IAM user. This will cause the connector to attempt to retrieve credentials for the specified role.
- AWSAccessKey: The access key of the authenticating IAM user.
- AWSSecretKey: The secret key of the authenticating IAM user.
If multi-factor authentication is required, specify the following:
- CredentialsLocation: The location of the settings file where MFA credentials are saved. See the Credentials File Location page under Connection String Options for more information.
- MFASerialNumber: The serial number of the MFA device if one is being used.
- MFAToken: The temporary token available from your MFA device.
Note: If you want to control the duration of the temporary credentials, set the TemporaryTokenDuration property (default: 3600 seconds).
Kerberos
The authentication with Kerberos is initiated by PostgreSQL Server when the CData Tableau Connector for PostgreSQL is trying to connect to it. You should setup Kerberos on the PostgreSQL Server to activate this authentication method. Once you have Kerberos authentication setup on the PostgreSQL Server, see Using Kerberos for details on how to authenticate with Kerberos by the connector.
Next Step
See Using the Connector to create data visualizations.