Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

FieldDescriptionExample
sp_con_nameLowercased connection name, used as saltrepository
sp_con_stringODBC Connection Stringdsn=$DSN$;uid=$USER$;pwd=$PASSWORD$;
sp_user_nameUser Nameredscheduler_user
sp_encrypted_pwdEncrypted PasswordVTj0Q2xapJEWpQed8DJYvBEEnRedR94NstiHJUlLt0gC

authConfig

Auth Configuration JSON{}
token_1Encrypted TokenVTj0Q2xapJEWpQed8DJYvBEEnRedR94NstiHJUlLt0gC
token_2Encrypted TokenVTj0Q2xapJEWpQed8DJYvBEEnRedR94NstiHJUlLt0gC
token_3Encrypted TokenVTj0Q2xapJEWpQed8DJYvBEEnRedR94NstiHJUlLt0gC

Encryption

WhereScape provides an encryption utility as a stand-alone tool as well as being imbedded in the applicable Azkaban components. Azkaban decryption of WhereScape encrypted passwords expects the salt used for encryption to be the lowercased connection name. Azkaban has access to the Profile Password, required for decryption, via a new property (com.wherescape.red.profilePassword) in the azkaban.local.properties file of each Azkaban server instance. The password values in both the Azkaban properties files and the Azkaban Users.xml file can also be stored using encryption so that they do not appear in plain text in those files. See Azkaban properties for more details.

...