Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Secure Agent services
  3. API Microgateway Service
  4. CMI Streaming Agent
  5. Common Integration Components
  6. Connector Service
  7. Data Access Management Agent service
  8. Data Access Management Proxy service
  9. Database Ingestion service
  10. Data Integration Server
  11. Elastic Server
  12. File Integration Service
  13. GitRepoConnectApp
  14. IDMC Data Gateway Service
  15. Mass Ingestion (Files)
  16. Metadata Foundation Application
  17. Metadata Platform Service
  18. Process Server
  19. SecretManagerApp
  20. Configuring Secure Agent service properties

Secure Agent Services

Secure Agent Services

Data Access Management Agent service properties

Data Access Management
Agent service properties

To change or optimize the behavior of the
Data Access Management
Agent service, configure its properties in the
System Configuration Details
section when you edit a Secure Agent.
The following image shows the
Data Access Management
Agent service properties:
The image shows the Data Access Management Agent service properties. When
						you view or edit a Secure Agent and select the Data Access Management Agent,
						the Data Access Management Agent properties appear in the System
						Configuration Details area. In this image, the service type is set to "All
						Types," and several file, user, and update properties display.
You can configure the following system properties of the
Data Access Management
Agent service in the
System Configuration Details
section:
Type
Name
Description
Sample Value
Default Value
AGENT
enableFileBasedAudit
Set to true to generate audit logs. Leave as false to prevent audit log generation.
true
false
AGENT
customFileBasedAuditPath
You can specify a directory path to which audit logs are written. The default path is the path in which you installed the Secure Agent.
log/audit/
not set
AGENT
usernameWithConnectionPrivileges
You must specify a user name from the tenant that has the read Connection privilege. This user name is used to retrieve the connection configuration and credentials in the runtime service required by the agent.
jdoe
The
Data Access Management
Agent and Proxy services will not start without valid values for the usernameWithConnectionPrivileges and userWithConnectionPrivileges properties.
not set
AGENT
pullChangesBatchSize
The maximum number of updates in a batch to process.
50
100
AGENT
pollingPeriod
The period for polling for new updates.
1h
5m
AGENT
pingPeriod
How often to ping the runtime service to indicate that the agent is still up and consuming updates.
45s
1m
AGENT
datasourceChangesParallelism
The maximum number of data source updates to process in parallel.
3
4
AGENT
maxShutdownTime
How long to wait for a graceful shutdown to complete before invoking a forced shutdown.
45s
1m
If your organization uses an identity provider (IdP) and pushes data access policies to Amazon Redshift, you must add a custom property for the namespace that Amazon Redshift requires to the
Data Access Management
Agent service. This allows the Secure Agent to map the IDMC user groups in the data access policies into the IdP-based roles created in a namespace in Amazon Redshift.

0 COMMENTS

We’d like to hear from you!