Table of Contents

Search

  1. Installation Overview
  2. Before You Install the Services
  3. Service Installation
  4. After You Install the Services
  5. Client Installation
  6. Uninstallation
  7. Starting and Stopping Informatica Services
  8. Connecting to Databases from Windows
  9. Connecting to Databases from UNIX
  10. Updating the DynamicSections Parameter of a DB2 Database
  11. Installation and Configuration Checklist
  12. Split Domain Configuration for Metadata Manager

Installation and Configuration Guide

Installation and Configuration Guide

Domain Security

Domain Security

When you install the Informatica services and create a domain, you can enable options to configure security in the domain.
You can configure the following security options for the domain:
Secure communication for services and the Service Manager
When you configure secure communication for the domain, you secure the connections between the Service Manager and the services in the domain. Informatica provides an SSL certificate that you can use to secure the domain. However, for better security for the domain, you can provide the SSL certificate during the installation. Provide the keystore and truststore files that contain the SSL certificates you want to use.
Secure domain configuration repository database
When you install the Informatica services and create a domain, you can create the domain configuration repository in a database secured with the SSL protocol. Access to the secure database requires a truststore that contains the SSL certificates for the database. During installation, you provide the truststore file that contains the SSL certificate you want to use.
Secure connection for the Administrator tool
Informatica Administrator (the Administrator tool) is the tool that you use to administer the Informatica domain. During installation, you can configure a secure HTTPS connection for the Administrator tool. You can provide the keystore file to use for the HTTPS connection.
For more information about domain security, see the
Informatica Security Guide
.