Preventing users from uploading JDBC drivers

By default, a user with the Administer platform permission and the Manage configurations permission can upload JDBC driver files through the IBM Cloud Pak® for Data web client or through REST API calls. You can optionally prevent users from uploading these files if you want tighter control over which files are uploaded to the cluster.

JDBC drivers are used to create Generic JDBC connections and to use some of the predefined connectors.

Who needs to complete this task?
To complete this task, you must be either:
  • A cluster administrator
  • An instance administrator
When do you need to complete this task?
Complete this task only if you want to prevent authorized users from uploading JDBC driver files from the Cloud Pak for Data web client or through REST API calls.
Important: If you disable this feature, a cluster administrator or instance administrator must manually upload JDBC driver files from the OpenShift® command-line interface.

About this task

If you set the wdp_connect_connection_disable_jar_tab parameter to true, users with the Administer platform permission and the Manage configurations permission cannot:
  • Upload JDBC drivers from the web client or REST API.
  • Delete JDBC drivers from the web client or REST API.

Procedure

  1. Log in to Red Hat® OpenShift Container Platform as a user with sufficient permissions to complete the task.
    oc login ${OCP_URL}
  2. Run the following command to set the wdp_connect_connection_disable_jar_tab parameter to true:
    oc patch ccs ccs-cr \
    --namespace=${PROJECT_CPD_INST_OPERANDS} \
    --type=merge \
    --patch '{"spec": {"wdp_connect_connection_disable_jar_tab": "true"}}'
  3. Wait for the common core services status to be Completed:
    oc get ccs ccs-cr \
    --namespace=${PROJECT_CPD_INST_OPERANDS}

Results

After you prevent users from uploading JDBC drivers, only a cluster administrator or instance administrator can upload JDBC driver files from the OpenShift command-line interface.