Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Choose Authentication as IAM authentication and fill in the required fields. The username used should be the created in step 3, add the access key and secret key of the IAM user that has the policy created in step 2, then click create connection

...

  1. image-20240429-070015.pngImage Added

  1. Verify that credentials and setup are correct by checking if connection object lists will show similar to standard authentication

...

  1. image-20240429-070035.pngImage Added