Amazon Redshift will no longer support the creation of new Python UDFs starting November 1, 2025.
If you would like to use Python UDFs, create the UDFs prior to that date.
Existing Python UDFs will continue to function as normal. For more information, see the
blog post
Onboarding
Redshift cluster registration
Redshift supports creating a new cluster or restoring a cluster from snapshot with AWS Glue Data Catalog (GDC) registration. You can specify the GDC catalog name part of this registration. To support IdC identity propagation you can specify a Redshift IdC application arn of Lakehouse type to enable IdC identity propagation.
Create a new cluster with Glue data catalog registration
Restore a new cluster with AWS Glue Data Catalog registration
Modify an existing cluster with AWS Glue Data Catalog registration
If your Redshift cluster is already associated to a Redshift IdC Application of type non-lakehouse, the following occurs during AWS Glue Data Catalog registration:
-
When no Redshift IdC Application ARN is provided, the existing Redshift IdC Application in your catalog will be set to disabled status.
-
When a Redshift IdC Application of type Lakehouse from different AWS IAM Identity Center instance is specified, the current IdC provider becomes disabled
-
When a Redshift IdC Application of type Lakehouse from the same AWS IAM Identity Center instance is provided
-
The Redshift IdC Application ARN in your catalog will be changed to the ARN of the Redshift IdC Application of type Lakehouse. The updated catalog can be checked by querying the svv_identity_providers. For more information about the svv_identity_providers, see svv_identity_providers.
-
AWS IAM Identity Center federated users who previously had access to the Redshift cluster, must be explicitly granted CONNECT privileges by the Admins to access the cluster. For more information about granting CONNECT privileges, see Connect privileges.
-
After registering with AWS Glue Data Catalog, your existing AWS IAM Identity Center federated identities and their owned resources remain unchanged. The namespace associations for these federated identities are also preserved.
-
Redshift Serverless namespace registration
Redshift Serverless enables workgroup-attached Serverless namespaces to register with AWS Glue Data Catalog. Note that your database will restart during this update.
If your Redshift Serverless Namespace is already associated to a Redshift IdC Application of type non-lakehouse, the following occurs during Glue Data Catalog registration:
-
When no Redshift IdC Application ARN is provided, the existing Redshift IdC Application in your catalog will be set to disabled status.
-
When a Redshift IdC Application of type Lakehouse from different AWS IAM Identity Center instance is specified, the current IdC provider becomes disabled
-
When a Redshift IdC Application of type Lakehouse from the same AWS IAM Identity Center instance is provided
-
The Redshift IdC Application ARN in your catalog will be changed to the ARN of the Redshift IdC Application of type Lakehouse. The updated catalog can be checked by querying the svv_identity_providers. For more information about the svv_identity_providers, see svv_identity_providers.
-
AWS IAM Identity Center federated users who previously had access to the Redshift cluster, must be explicitly granted CONNECT privileges by the Admins to access the cluster. For more information about granting CONNECT privileges, see Connect privileges.
-
After registering with AWS Glue Data Catalog, your existing AWS IAM Identity Center federated identities and their owned resources remain unchanged. The namespace associations for these federated identities are also preserved.
-
Enable AWS IAM Identity Center identity propagation
Amazon Redshift supports Identity Center (IdC) identity propagation to seamlessly pass IdC user identities between Redshift instances and AWS Lake Formation/AWS Glue services.
Prerequisites
-
You have created an Amazon Redshift IdC Application of type Lakehouse, refer to AWS IAM Identity Center application configuration for Redshift warehouse with federated permissions.
-
You have an Amazon Redshift Cluster or Amazon Redshift Serverless Namespace that is registered with AWS Glue Data Catalog.
-
Redshift Serverless Namespace requires workgroup attached to perform the related operations.
-
If your Redshift Cluster or Redshift Serverless Namespace is already associated to a Redshift IdC Application of type other than Lakehouse, the following occurs during AWS Glue Data Catalog registration:
-
When no Redshift IdC Application ARN is provided, the existing Redshift IdC Application in your catalog will be set to disabled status.
-
When a Redshift IdC Application of type Lakehouse from different AWS IAM Identity Center instance is specified, the current IdC provider becomes disabled
-
When a Redshift IdC Application of type Lakehouse from the same AWS IAM Identity Center instance is provided
-
The Redshift IdC Application ARN in your catalog will be changed to the ARN of the Redshift IdC Application of type Lakehouse. The updated catalog can be checked by querying the svv_identity_providers. For more information about the svv_identity_providers, see svv_identity_providers.
-
AWS IAM Identity Center federated users who previously had access to the Redshift cluster, must be explicitly granted CONNECT privileges by the Admins to access the cluster. For more information about granting CONNECT privileges, see Connect privileges.
-
After registering with AWS Glue Data Catalog, your existing AWS IAM Identity Center federated identities and their owned resources remain unchanged. The namespace associations for these federated identities are also preserved.
-
Enable AWS IAM Identity Center identity propagation for Amazon Redshift provisioned clusters
For Amazon Redshift Provisioned Cluster that registered its namespace to AWS Glue Data Catalog, it requires Lakehouse Amazon Redshift IdC Application which doesn’t require explicitly AWS IAM Identity Center Identity user assignment to the application, the IdC users login privilege is managed by CONNECT privilege on the Redshift warehouse.
Enable AWS IAM Identity Center identity propagation for Amazon Redshift Serverless namespaces
ALTER USER SET GLOBAL IDENTITY
In addition to IAM and AWS IAM Identity Center credentials, the user running queries against Redshift Warehouses with federated permissions can authenticate using an IAM role. A superuser can set an IAM role for another non-federated user to associate automatically at session establishment, and this IAM role will be assumed when making queries against Redshift Warehouses with Federated Permissions. This functionality is provided to allow AWS IdC users to authenticate non-interactively.
This feature is useful for following use cases:
-
Customers that have large and complex setups with existing local warehouse user in addition to users with global identity.
-
Customers who use IdC, but who wish to be able to log in automatically without interactive browser action to log in.
Requirements and limitations:
-
Only super user can set the IAM role by
ALTER USER. -
IAM role must be attached to the cluster.
-
IAM role must have permissions to access resources needed to run queries on Redshift warehouses with federated permissions. We recommend using
AmazonRedshiftFederatedAuthorizationAWS managed policy. -
The users authenticating via GLOBAL IDENTITY IAM role can query views in Redshift Warehouses with Federated Permissions, but cannot CREATE, ALTER, REFRESH or DROP them.
Syntax
The following syntax describes the ALTER USER SET GLOBAL IDENTITY command used to set IAM role for a non-federated database user to run queries against Redshift Warehouses with Federated Permissions.
ALTER USERusernameSET GLOBAL IDENTITY IAM_ROLE 'arn:aws:iam::<AWS-account-id>:role/<role-name>'
Now when authenticated as the target user (by connecting directly as username, or by using SET SESSION AUTHORIZATION
), you can check global identity role using
SHOW GLOBAL IDENTITY
Note, the global identity role is associated with the user on session establishment. If you set the global identity for the currently logged in user, that user will need to reconnect for global identity to take effect.
The following command can be used to remove the associated IAM role.
ALTER USERusernameRESET GLOBAL IDENTITY
Parameters
- username
-
Name of the user. Cannot be a federated users, like IAM user or AWS IdC user.
- IAM_ROLE 'arn:aws:iam::<account-id>:role/<role-name>'
-
Use the Amazon Resource Name (ARN) for an IAM role that your cluster uses for authentication and authorization when user
usernameruns queries on Redshift warehouses with federated permissions. This role needs to have the required permissions to run the query. We recommend usingAmazonRedshiftFederatedAuthorizationAWS Managed Policy.