Security Configuration for Informatica Utilities
When you install Informatica utilities, you might need to configure the machines based on the domain security configuration. If you do not configure the machines correctly, the command line programs might not be able to authenticate users with the domain.
Configure the machines where you installed the Informatica utilities when the domain uses the following security configurations:
- Secure communication
- If secure communication is enabled for the domain, you might need to configure the machines to use the truststore file. If you use a custom truststore file, you must configure environment variables that specify the truststore file directory and the truststore password.
- Kerberos authentication
- If the domain uses Kerberos authentication, you must copy the Kerberos configuration file to the machines where you installed the Informatica utilities. You must also configure the machines to locate the Kerberos configuration file for the domain.