Summary: Security is always a concern when working with data connections. When using tools like Anaplan Connect, Informatica Cloud, or various ETL or iPaaS connectors, there needs to be an authentication protocol that lets the system know the data is coming from a verified and trusted source. This lesson reviews different authentication methods, choosing the best method in different situations, and locating more resources and training on different authentication methods. 

Audience: Model Builders, Data Integration Specialists, Solution Architects

Lesson Duration: 4 minutes

This micro lesson is included in Level 3 Model Building training program available in the Learning Center. 

For training purposes only. Not for use with, distribution or quotation to the general public.  © 2020 Anaplan, Inc. All rights reserved. Proprietary and Confidential. Read Full Legal Disclaimer

0 Kudos