Trino can be configured to enable frontend password authentication over HTTPS for clients, such as the CLI, or the JDBC and ODBC drivers. The username and password (or password and security token concatenation) are validated by having the Trino coordinator perform a login to Salesforce.
This allows you to enable users to authenticate to Trino via their Salesforce basic credentials. This can also be used to secure the Web UI.
This is not a Salesforce connector, and does not allow users to query Salesforce data. It’s simply a means by which users can authenticate to Trino, similar to LDAP authentication or Password file authentication.
Salesforce authenticator configuration#
Enable Salesforce authentication by creating an
etc/password-authenticator.properties file on the coordinator:
password-authenticator.name=salesforce salesforce.allowed-organizations=<allowed-org-ids or all>
The following configuration properties are available:
Comma separated list of 18 character Salesforce.com
Organization IDs for a second, simple layer of security.
This option can be explicitly ignored using
Maximum number of cached authenticated users.
How long a cached authentication should be considered valid.
There are two Salesforce specific aspects to this authenticator. They are the use of the Salesforce security token, and configuration of one or more Salesforce.com Organization IDs.
Credentials are a user’s Salesforce username and password if Trino is connecting from a whitelisted
IP, or username and password/security token
concatenation otherwise. For example, if Trino is not whitelisted, and your password is
and security token is
passwordtoken to authenticate.
You can configure a public IP for Trino as a trusted IP by whitelisting an IP range.
Salesforce.com organization IDs#
You can configure one or more Salesforce Organization IDs for additional security. When the user authenticates,
the Salesforce API returns the 18 character Salesforce.com Organization ID for the user. The Trino Salesforce
authenticator ensures that the ID matches one of the IDs configured in
Optionally, you can configure
all to explicitly ignore this layer of security.