To enable different users to run mappings that read or processes data from sources or targets that use Kerberos authentication, configure user impersonation for the native environment.
To enable user impersonation, you must complete the following steps:
Specify Kerberos authentication properties for the Data Integration Service.
Configure the execution options for the Data Integration Service.