Table of Contents

Search

  1. Version 10.1.1
  2. Version 10.1
  3. Version 10.0
  4. Version 9.6.1
  5. Version 9.6.0

Security

This section describes new security features in version 10.1.
Effective in version 10.1, you can customize the cipher suites that the Informatica domain uses for secure communication within the domain and secure connections to web application services. You can create a whitelist and blacklist to enable or block specific ciphersuites. This feature is also available in 9.6.1 HotFix 4. It is not available in 10.0.
The Informatica domain uses an effective list of cipher suites that uses the cipher suites in the default and whitelists but blocks cipher suites in the blacklist.
For more information, see the "Domain Security" chapter in the
Informatica 10.1 Security Guide
.
Effective in version 10.1, if the Data Integration Service runs on UNIX or Linux, you can create operating system profiles and configure the Data Integration Service to use operating system profiles. Use operating system profiles to increase security and to isolate the run-time user environment in Informatica products such as Big Data Management, Data Quality, and Intelligent Data Lake.
The Data Integration Service uses operating system profiles to run mappings, profiles, scorecards, and workflows. The operating system profile contains the operating system user name, service process variables, Hadoop impersonation properties, the Analyst Service properties, environment variables, and permissions. The Data Integration Service runs the mapping, profile, scorecard, or workflow with the system permissions of the operating system user and the properties defined in the operating system profile.
For more information about operating system profiles, see the "Users and Groups" chapter in the
Informatica 10.1 Security Guide
.
Effective in version 10.1, you can assign permissions to control the level of access that a user or group has on applications and application objects such as mappings and workflows.
For more information about application and application object permissions, see the "Permissions" chapter in the
Informatica 10.1 Security Guide
.


Updated April 09, 2019