Windows DSN Configuration
Using the Microsoft ODBC Data Source Administrator
You can use the Microsoft ODBC Data Source Administrator to edit the DSN configuration. Note that the DSN is created during the installation process.
Complete the following steps to edit the DSN configuration:
- Select Start > Search, and enter ODBC Data Sources in the Search box.
- Choose the version of the ODBC Administrator that corresponds to the bitness of your application (32-bit or 64-bit).
- Click the System DSN tab.
- Select the system data source and click Configure.
- Edit the information on the Connection tab and click OK.
Note: For .NET Framework 4.0, the driver distributes Microsoft Visual C++ 2015-2022 Redistributable. For .NET Framework 3.5, the driver distributes Microsoft Visual C++ 2008 Redistributable.
Ensuring Registry Access
The driver stores connection information in the Windows registry. To ensure that the driver can write to the registry, perform either of the following actions:
- Run the calling application as an administrator.
- Connect via a User DSN instead of a System DSN.
Connecting to AlloyDB
The following connection properties are required in order to connect to AlloyDB.
- Server: The host name or IP of the server hosting the AlloyDB database.
- Port (optional): The port of the server hosting the AlloyDB database. This property is set to 5432 by default.
- User: The user which will be used to authenticate with the AlloyDB server.
- Password: The password which will be used to authenticate with the AlloyDB server.
- Database (optional): The database to connect to when connecting to the AlloyDB Server. If this is not set, the user's default database will be used.
Authenticating to AlloyDB
Standard AuthenticationStandard authentication (using the user/password combination supplied earlier) is the default form of authentication.
No further action is required to leverage Standard Authentication to connect.
pg_hba.conf Auth Schemes
There are additional methods of authentication supported by the driver which must be enabled in the pg_hba.conf file on the AlloyDB server.
You may find instructions about authentication setup on the AlloyDB Server here.
You can authenticate using MD5 password verification by setting the auth-method in the pg_hba.conf file to md5.
The driver can authenticate by verifying the password with SASL (particularly, SCRAM-SHA-256).
To use this authentication method, set the auth-method in the pg_hba.conf file to scram-sha-256.
The authentication with Kerberos is initiated by AlloyDB Server when the CData ODBC Driver for AlloyDB is trying to connect to it. Set up Kerberos on the AlloyDB Server to activate this authentication method. Once you have Kerberos authentication set up on the AlloyDB server, see Using Kerberos for details regarding how to authenticate with Kerberos by the driver.