Microsoft SQL Server Connector > Connections for Microsoft SQL Server > Prepare for authentication
  

Prepare for authentication

You can configure Database or Kerberos authentication method to connect to Microsoft SQL Server.
Before you configure the connection properties, you need to keep the authentication details handy based on the authentication type that you want to use. For Kerberos authentication, you need to configure certain prerequisites.

Prepare for Kerberos authentication

You can use Kerberos authentication to connect to Microsoft SQL Server databases by placing the required configuration files on the Secure Agent machine. You can also use Kerberos authentication to connect to SSL-enabled Microsoft SQL Server databases.
When you configure Kerberos authentication to connect to Microsoft SQL Server, consider the following guidelines:

Configuring Kerberos authentication

Before you use Kerberos authentication to connect to Microsoft SQL Server on Linux or Windows, the organization administrator needs to perform the prerequisite tasks.
  1. 1To configure the Java Authentication and Authorization Service configuration file (JAAS), perform the following tasks:
    1. aCreate a JAAS configuration file on the Secure Agent machine.
    2. bAdd the following entries to the JAAS configuration file:
    3. JDBC_DRIVER_01 {
      com.sun.security.auth.module.Krb5LoginModule required
      useTicketCache=true
      };
      Note: Ensure that you specify each key-value pair on a separate line. You can update the values of the given configuration or add additional configuration details according to your requirements.
  2. 2To configure the krb5.conf file, perform the following tasks:
    1. aCreate a krb5.conf file on the Secure Agent machine.
    2. bAdd the details of the Key Distribution Center (KDC) and admin server to the krb5.conf file in the following format:
    3. [libdefaults]
      default_realm = <Realm name>
      forwardable = true
      ticket_lifetime = 24h

      [realms]
      <REALM NAME> = {
      kdc = <Location where KDC is installed>
      admin_server = <Location where KDC is installed>
      }
      [domain_realm]
      <domain name or host name> = <Domain name or host name of Kerberos>
      <domain name or host name> = <Domain name or host name of Kerberos>
      Note: Ensure that you don’t set user-specific values in any key-value pair. You can update the values of the given configuration or add additional configuration details according to your requirements.
  3. 3To generate the credential cache file on the Secure Agent machine, perform the following tasks:
    1. aOn the Secure Agent machine, run the following command and specify the Microsoft SQL Server user name and realm name:
    2. kinit <user name>@<realm_name>
    3. bWhen prompted, enter the password for the Kerberos principal user.
    4. cOptionally, when you connect to a Microsoft SQL Server database on Linux, you can run the following command to generate the credential cache file with the specified file name and directory on the Secure Agent machine:
    5. kinit -c <Directory and file name where you want to create the credential cache> <user name>@<realm_name>
  4. 4Add the KRB5_CONFIG, KRB5CCNAME, and JAASCONFIG properties in the Metadata Advanced Connection Properties field in the Microsoft SQL Server connection.
  5. For example, add the properties in the following format:
    KRB5_CONFIG=<Absolute path of the Kerberos configuration file>\krb5.conf;KRB5CCNAME=<Absolute path of the credential cache file>/<File name>;JAASCONFIG=<Absolute path of the JAAS config file>\<File name>.conf
    Note: Ensure that you separate each key-value pair with a semicolon.
  6. 5Add the KRB5_CONFIG and KRB5CCNAME properties in the Runtime Advanced Connection Properties field in the Microsoft SQL Server connection.
  7. For example, add the properties in the following format:
    KRB5_CONFIG=<Absolute path of the Kerberos configuration file>\krb5.conf;KRB5CCNAME=<Absolute path of the credential cache file>/<File name>
    Note: Ensure that you separate each key-value pair with a semicolon.
  8. 6Optionally, set the environment variables on the Secure Agent machine.
  9. Note: If you set the environment variables, you can't use more than one Kerberos principal user in a connection.
    1. aSet the following environment variables:
    2. bRestart the Secure Agent.
  10. 7Ensure that the user who runs the mapping has read access to the files related to Kerberos authentication on the Secure Agent.