Table of Contents

Search

  1. Preface
  2. Command Line Programs and Utilities
  3. Installing and Configuring Command Line Utilities
  4. Using the Command Line Programs
  5. Environment Variables for Command Line Programs
  6. Using infacmd
  7. infacmd as Command Reference
  8. infacmd aud Command Reference
  9. Infacmd bg Command Reference
  10. infacmd cms Command Reference
  11. infacmd dis Command Reference
  12. Infacmd es Command Reference
  13. infacmd ipc Command Reference
  14. infacmd isp Command Reference
  15. infacmd mrs Command Reference
  16. infacmd ms Command Reference
  17. infacmd oie Command Reference
  18. infacmd ps Command Reference
  19. infacmd pwx Command Reference
  20. infacmd rms Command Reference
  21. infacmd rtm Command Reference
  22. infacmd sch Command Reference
  23. infacmd search Command Reference
  24. infacmd sql Command Reference
  25. infacmd tdm Command Reference
  26. infacmd wfs Command Reference
  27. infacmd ws Command Reference
  28. infacmd xrf Command Reference
  29. infacmd Control Files
  30. infasetup Command Reference
  31. pmcmd Command Reference
  32. pmrep Command Reference
  33. Working with pmrep Files

Example

Example

You administer PowerCenter for an organization that has a centralized LDAP NIS for user authentication. When you upgrade PowerCenter, you decide to use the LDAP for user authentication. The upgrade installs the LDAP security module in the repository security folder. After connecting to the repository with the Connect command, the administrator runs the
pmrep
command to register the new external module with the repository:
pmrep registerplugin -i security/ldap_authen.xml -l adminuser -w admnpass
The -l login name and -w login password options contain the valid NIS login information for the user running the
pmrep
command. After registration, you must use this login name and password to access the repository.
The login name and password must be valid in the external directory, or the administrator cannot access the repository using LDAP.
The -i option contains the XML file name that describes the security module.


Updated April 22, 2019