Table of Contents

Search

  1. Preface
  2. Introduction to Data Engineering Administration
  3. Authentication
  4. Running Mappings on a Cluster with Kerberos Authentication
  5. Authorization
  6. Cluster Configuration
  7. Cloud Provisioning Configuration
  8. Data Integration Service Processing
  9. Appendix A: Connections Reference
  10. Appendix B: Monitoring REST API

Permissions

Permissions

Permissions control the level of access that a user or group has for a cluster configuration.
You can configure permissions for a cluster configuration in the Administrator tool and using infacmd.
Any cluster configuration permission that is assigned to a user or group in one tool also applies in the other tool. For example, you grant GroupA permission on ConfigurationA using the Informatica command line interface. GroupA has permission on ConfigurationA in the Developer tool also.
The following Informatica components use the cluster configuration permissions:
  • Administrator tool. Enforces read, write, execute, and grant permissions on cluster configurations.
  • Informatica command line interface. Enforces read, write, execute, and grant permissions on cluster configurations.
  • Developer tool. Enforces read, write, and execute permissions on cluster configurations.
  • Data Integration Service. Enforces execute permissions when a user tries to preview data or run a mapping, scorecard, or profile.

0 COMMENTS

We’d like to hear from you!