Authentication method

Data Integrity Suite

Product
Spatial_Analytics
Data_Integration
Data_Enrichment
Data_Governance
Precisely_Data_Integrity_Suite
geo_addressing_1
Data_Observability
Data_Quality
dis_core_foundation
Services
Spatial Analytics
Data Integration
Data Enrichment
Data Governance
Geo Addressing
Data Observability
Data Quality
Core Foundation
ft:title
Data Integrity Suite
ft:locale
en-US
PublicationType
pt_product_guide
copyrightfirst
2000
copyrightlast
2026

This section provides you the different authentication methods used for Amazon S3 datasource type in Data Integrity Suite.

Field Description
Authentication type Specifies the method used to authenticate with AWS, either by providing static credentials (Access key) or by using an IAM role:
  1. Access key: Identifies the authentication approach for AWS, utilizing static credentials to authenticate.
    1. Access key ID: Specifies the unique identifier of the static credentials.
    2. Secret key source: Specifies how the secret component of the credentials will be provided, through manual input. For using a key vault, refer to the configuration step here.
      1. Secret access key: Specifies the confidential secret paired with the access key ID. This is required for both access key authentication and IAM Role authentication. Example: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
  2. IAM role: Identifies the authentication approach for AWS, utilizing an IAM role with the appropriate role permission.
    1. Access key ID: Specifies the unique identifier of the IAM Role authentication.
    2. Secret key source: Specifies how the secret component of the credentials will be provided, through manual input. For using a key vault, refer to the configuration step here.
      1. Role ARN: Specifies the Amazon Resource Name (ARN) of the IAM role used for authentication.
      2. External ID(Optional field): Specifies a unique string provided by the third-party application that must be supplied when using an IAM role, to prevent the confused-deputy problem.