Use special character in DB password DMS endpoint

1

Hi Everyone,

I have a database server with a complex password (contains special characters). I created a DMS endpoint pointing to the server, when I tried to test the connection it keeps showing an error invalid password.

this is the password: A)%dX21}Tf~}b% (not a real password)

I found this statement from the documentation:
If you want to use special characters in your password, such as "+" or "&", enclose the entire password in curly braces "{}".

I have tried doing this {A)%dX21}Tf~}b%} but with no luck.

Please advice.

Thank you.

feita há 7 anos2708 visualizações
5 Respostas
0

Having the exact same issue. Did you find a solution in the meantime?

respondido há 6 anos
0

Same issue, is it a bug after aws update dms. I didn't faced it before (same password)

jindov
respondido há 6 anos
0

The curly braces {} are reserved characters for DMS allowing you to escape "unusual" characters that might otherwise cause problems for the connection string. It is therefore not possible at present to use them in the database password for the account used by DMS. We are aware of the limitation and will work to resolve it in the future.

AWS
John_W
respondido há 5 anos
profile picture
ESPECIALISTA
avaliado há 2 meses
0

JohnW@AWS wrote:
The curly braces {} are reserved characters for DMS allowing you to escape "unusual" characters that might otherwise cause problems for the connection string. It is therefore not possible at present to use them in the database password for the account used by DMS. We are aware of the limitation and will work to resolve it in the future.

Hi,
Any updates on this issue.
I need to set up source endpoint for DMS and the password contains both the characters ;}

Edited by: sendhil on Aug 25, 2020 3:34 AM

Edited by: sendhil on Aug 25, 2020 3:36 AM

sendhil
respondido há 4 anos
0

It's not really acceptable that DMS has tighter password restrictions than the source/target databases it works with.

For Oracle RDS we can (and do) use long machine generated passwords with many special characters such as !#$%&*+,-.:;<=>?[]^_{|}~... because we want the highest entropy possible. Notice that we even use curly braces { and } ... so it will be very frustrating if we have to start reducing things down to the lowest common denominator just because of DMS. :-/

Any word on when this restriction will be lifted?

gclough
respondido há 3 anos

Você não está conectado. Fazer login para postar uma resposta.

Uma boa resposta responde claramente à pergunta, dá feedback construtivo e incentiva o crescimento profissional de quem perguntou.

Diretrizes para responder a perguntas