Table of Contents

Search

  1. Preface
  2. Runtime environments
  3. Hosted Agent
  4. Secure Agent groups
  5. Secure Agents
  6. Secure Agent installation in a cloud environment
  7. Secure Agent installation in a local environment
  8. Serverless runtime environment setup in AWS
  9. Serverless runtime environments

Runtime Environments

Runtime Environments

Secure Agent installation on Linux

Secure Agent installation on Linux

On Linux, the Secure Agent runs as a process. You can use a shell command line to install, register, start, stop, and uninstall the Secure Agent.
You can also use the shell command line to check the Secure Agent status.
When you install a Secure Agent, you perform the following tasks:
  1. Verify that the machine meets the minimum requirements.
  2. Download the Secure Agent installer files.
  3. Install and register the Secure Agent.
Consider the following guidelines:
  • Create a specific user profile to install the Secure Agent with full access to all folders from the Secure Agent installation directory. Don't install the Secure Agent as the root user.
  • You can't install more than one Secure Agent on the same machine under the same user account. Multiple agents may exist under different user accounts.
  • Don't install the Secure Agent on any node within the Informatica domain.
For more information about Secure Agent requirements, see this KB article: IICS Minimum requirements and best practices when installing Informatica Cloud Secure Agent.

0 COMMENTS

We’d like to hear from you!