Table of Contents

Search

  1. Preface
  2. Introduction to Data Engineering Administration
  3. Authentication
  4. Running Mappings on a Cluster with Kerberos Authentication
  5. Authorization
  6. Cluster Configuration
  7. Cloud Provisioning Configuration
  8. Data Integration Service Processing
  9. Appendix A: Connections Reference
  10. Appendix B: Monitoring REST API

Data Engineering Administrator Guide

Data Engineering Administrator Guide

User Impersonation in the Native Environment

User Impersonation in the Native Environment

To enable different users to run mappings that read or processes data from sources or targets that use Kerberos authentication, configure user impersonation for the native environment.
To enable user impersonation, you must complete the following steps:
  1. Specify Kerberos authentication properties for the Data Integration Service.
  2. Configure the execution options for the Data Integration Service.

0 COMMENTS

We’d like to hear from you!