Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Switch from Full Delegation to Constrained Delegation

Switch from Full Delegation to Constrained Delegation

If you are using Full Delegation and want to use Constrained Delegation, perform the following steps.
  1. Shut down the domain.
  2. Enable Resource-based Constrained Delegation with S4U2Self for existing active directory users associated with keytab account on the KDC server.
  3. Start up the domain.

0 COMMENTS

We’d like to hear from you!