Azure Service Principal Authorization - Teradata Vantage

Teradata® VantageCloud Lake

Deployment
VantageCloud
Edition
Lake
Product
Teradata Vantage
Published
January 2023
Language
English (United States)
Last Update
2024-04-03
dita:mapPath
phg1621910019905.ditamap
dita:ditavalPath
pny1626732985837.ditaval
dita:id
phg1621910019905

If you are using Azure Service Principal authorization, configure your external object storage to allow Analytics Database to access it.

Depending on how you configured access to your Azure external object storage, the following variables can be used to create the authorization object. See Example: Creating an Authorization Object for Azure Service Principals and CREATE AUTHORIZATION.

The following variables are used in the CREATE AUTHORIZATION command. After you create the authorization object, use it to control access in the CREATE FOREIGN TABLE, READ_NOS, and WRITE_NOS commands.
Keyword Access Variable Value
AUTHSERVICETYPE Replace auth_service_type with the authorization for the storage service. For example: ASSUME_ROLE, AZURE_SERVICE_PRINCIPAL, and so on. For all the values, see AuthorizationsV[X].
CLIENT_ID Application ID.
CLIENT_SECRET Password associated with the service principal.
TENANT_ID Identifier of the Microsoft Entra ID instance.