Summary: Security is always a concern when working with data connections. When using tools like Anaplan Connect, Informatica Cloud, or various ETL or iPaaS connectors, there needs to be an authentication protocol that lets the system know the data is coming from a verified and trusted source. This lesson reviews different authentication methods, choosing the best method in different situations, and locating more resources and training on different authentication methods.
Audience: Model Builders, Data Integration Specialists, Solution Architects
Lesson Duration: 4 minutes
This micro lesson is included in Level 3 Model Building training program available in the Learning Center.