Documentation

Documentation

  • Getting Started
  • Core Concepts
  • Using Fivetran
  • Usage-Based Pricing
  • Connectors
  • Applications
  • Databases
  • Files
  • Events
  • Functions
  • Destinations
  • Partner-Built
  • Transformations
  • Logs
  • Security
  • REST API
  • Local Data Processing (HVR 6)
    • Getting Started
    • Supported Platforms
    • Capabilities
    • Requirements
      • Source and Target Requirements
        • Actian Vector Requirements
        • Amazon S3 Requirements
        • Apache HDFS Requirements
        • Apache Kafka Requirements
        • Aurora MySQL Requirements
        • Aurora PostgreSQL Requirements
        • Azure Blob Storage Requirements
        • Azure Data Lake Storage Requirements
        • Azure SQL Database Requirements
        • Azure SQL Managed Instance Requirements
        • Azure Synapse Analytics Requirements
        • Databricks Requirements
        • Db2 for i Requirements
        • Db2 for Linux, Unix and Windows Requirements
        • Db2 for z/OS Requirements
        • File, FTP, SFTP Requirements
        • Google BigQuery Requirements
        • Google Cloud Storage Requirements
        • Greenplum Requirements
        • Ingres Requirements
        • MariaDB Requirements
        • MySQL Requirements
        • Oracle Requirements
        • PostgreSQL Requirements
        • Redshift Requirements
        • SAP HANA Requirements
        • SAP NetWeaver Requirements
        • SingleStore Requirements
        • Snowflake Requirements
        • SQL Server Requirements
        • Sybase ASE Requirements
          • Sybase ASE as Source
          • Sybase ASE as Target
        • Teradata Requirements
      • Hub Repository Database Requirements
    • Install and Upgrade
    • User Interface
    • Command Line Interface
    • Action Reference
    • Property Reference
    • Advanced Operations
    • Internal Objects
    • REST API
    • FAQ
    • Release Notes
  • Release Notes
RSS
Release notes RSS
HVR 5 Documentation
HVR 5 Documentation
  • Support
  • Sign In
Edit on GitHub

Sybase ASE Requirementslink

Updated October 31, 2023

This section describes the requirements, access privileges, and other features of Fivetran Local Data Processing when using Sybase Adaptive Server Enterprise (ASE) for replication.

For information about compatibility and supported versions of Sybase ASE with Local Data Processing platforms, see Supported Platforms.

For the Capabilities supported by Local Data Processing on Sybase ASE, see Capabilities for Sybase ASE.

For information about the supported data types and mapping of data types in source DBMS to the corresponding data types in target DBMS or file format, see Data Type Mapping.

For the character encodings supported by Local Data Processing on Sybase ASE, see the Character Encodings page.

Supported Editionslink

Local Data Processing supports the following Sybase ASE editions:

  • Developer Edition
  • Enterprise Edition
  • Express Edition

Kerberos Authenticationlink

Before you configure Local Data Processing for Kerberos authentication with Sybase ASE, refer to the Sybase ASE documentation for information about how to configure Kerberos for Sybase ASE.

Local Data Processing supports two ways for Kerberos authentication:

  1. Accessing the kerberized Sybase ASE server with the User and Key Tab parameters supplied. In this case, Local Data Processing will run kinit to authenticate itself. To use a keytab file with Local Data Processing, enter the details in the User and Key Tab fields of the Location Connection dialog.

    Additionally, the following action must be defined for a Sybase ASE location:

    GroupTableActionParameter(s)
    Sybase ASE*EnvironmentName=KRB5_CONFIGValue=full path to the krb5.conf file
  2. Accessing the kerberized Sybase ASE server without supplying the User and Key Tab parameters. In this case, the Fivetran Agent Listener (in case of a remote High-Volume Agent connecting to Sybase ASE) or the Scheduler (in case of a local Local Data Processing connecting to Sybase ASE) should be started from an already Kerberos-authenticated environment.

Related Articleslink

  • Sybase ASE as Source
  • Sybase ASE as Target
  • Location Connection for Sybase ASE

Questions?

We're always happy to help with any other questions you might have! Send us an email.

    Thanks for your feedback!
    Was this page helpful?