Table of Contents

Search

  1. Preface
  2. Command Line Programs and Utilities
  3. Installing and Configuring Command Line Utilities
  4. Using the Command Line Programs
  5. Environment Variables for Command Line Programs
  6. Using infacmd
  7. infacmd as Command Reference
  8. infacmd aud Command Reference
  9. Infacmd bg Command Reference
  10. infacmd cluster Command Reference
  11. infacmd cms Command Reference
  12. infacmd dis Command Reference
  13. Infacmd es Command Reference
  14. infacmd ihs Command Reference
  15. infacmd ipc Command Reference
  16. infacmd isp Command Reference
  17. infacmd ldm Command Reference
  18. infacmd mrs Command Reference
  19. infacmd ms Command Reference
  20. infacmd oie Command Reference
  21. infacmd ps Command Reference
  22. infacmd pwx Command Reference
  23. infacmd rms Command Reference
  24. infacmd rtm Command Reference
  25. infacmd sch Command Reference
  26. infacmd search Command Reference
  27. infacmd sql Command Reference
  28. infacmd tdm Command Reference
  29. infacmd wfs Command Reference
  30. infacmd ws Command Reference
  31. infacmd xrf Command Reference
  32. infacmd Control Files
  33. infasetup Command Reference
  34. pmcmd Command Reference
  35. pmrep Command Reference
  36. Working with pmrep Files

Setting the Kerberos Environment Variables

Setting the Kerberos Environment Variables

On the machine that hosts the command line programs, specify the location of the credential cache and configuration file in the Kerberos environment variables.
Set the following environment variables:
KRB5CCNAME
Stores the default path and filename for the Kerberos credentials cache. When you run the
kinit
utility to generate the user credential cache,
kinit
stores the credential cache in the default file that you set in the KRB5CCNAME environment variable.
KRB5_CONFIG
Stores the path and file name of the Kerberos configuration file. The name of the Kerberos configuration file is krb5.conf. For information about the contents of the krb5.conf file, see the
Informatica Security Guide
.


Updated April 15, 2019