Data Cloud provides the ability to integrate multiple sources of data and create your own data lake to use with AI. However, having access to a myriad of potential sources means we also have an array of ways to authenticate against them. Authentication patterns have flourished over the years of web development to help keep the connections between data and users secure. This means that admins who are looking at the various connectors they can use to pull data into Data Cloud may leave a trail of potentially confusing authentication routines.
In this blog, we’ll break down the basics of authentication and the various forms it takes for Data Cloud. We’ll draw some broad strokes on security in general to give a baseline on how these methods work, and then point back to their usage in Data Cloud.
Who, what, where, when
Let’s break down authentication in really broad strokes.
Leave a Reply