Announcing the Saviynt Knowledge Exchange unifying the Saviynt forums, documentation, training,
and more in a single search tool across platforms. Read the announcement here.
No ratings
RakeshMG
Saviynt Employee
Saviynt Employee

Use Case

How to use Active Directory Domain accounts to authenticate and build connector for MS SQL Database using Kerberos authentication mechanism.

Applicable Version(s)

v2023.x

Solution

To connect to Active Directory domain accounts with MS SQL database using Kerberos, use a format similar to the following:
jdbc:sqlserver://host:port;DatabaseName=<dabase name>;authenticationScheme=JavaKerberos;integratedSecurity=true;userName=${USERNAME};password=${PASSWORD} 


To define SQL Server timeout, use the format similar to the following:

jdbc:jtds:sqlserver://<ip_address>/<db_name>;instance=<SQLserver_name>;loginTimeout=5;socketTimeout=30000 


Example 3: To connect to Oracle DB with MySQL database, use a format similar to the following:
jdbc:oracle:thin:@#HOST#:#PORT#:#DB#


To define Postgres timeout, use the format similar to the following:

jdbc:postgresql://host:port/dbname?options=-c%20connectTimeout=5%20-c%20socketTimeout=30  



References

https://docs.saviyntcloud.com/bundle/Database-v23x/page/Content/Configuring-the-Integration-for-Impo...

Version history
Last update:
‎03/29/2023 05:57 AM
Updated by:
Contributors