Table of Contents

Search

  1. Preface
  2. Runtime environments
  3. Hosted Agent
  4. Secure Agent groups
  5. Serverless runtime environments
  6. Connectors in a serverless runtime environment
  7. Secure Agents
  8. Secure Agent installation

Runtime Environments

Runtime Environments

Installing in Linux

Installing in Linux

On Linux, the Secure Agent runs as a process. You can use a shell command line to install, register, start, stop, and uninstall the Secure Agent.
You can also use the shell command line to check the Secure Agent status.
When you install a Secure Agent, you perform the following tasks:
  1. Verify that the machine meets the minimum requirements.
  2. Download the Secure Agent installer files.
  3. Install and register the Secure Agent.
Consider the following guidelines:
  • Create a specific user profile to install the Secure Agent with full access to all folders from the Secure Agent installation directory. Don't install the Secure Agent as the root user.
  • You can't install more than one Secure Agent on the same machine under the same user account. Multiple agents may exist under different user accounts.
  • Don't install the Secure Agent on any node within the Informatica domain.

0 COMMENTS

We’d like to hear from you!