Table of Contents


  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. Single Sign-on for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

SAML-based Single Sign-on Setup

SAML-based Single Sign-on Setup

Configure Active Directory Federation Services (AD FS) and the Informatica domain to use SAML-based single sign-on.
To configure SAML-based single sign-on for supported Informatica web applications, perform the following tasks:
  1. Create an LDAP security domain for Informatica web application user accounts, and then import the users into the domain from Active Directory.
  2. Export the Identity Provider Assertion Signing Certificate from AD FS.
  3. Import the Identity Provider Assertion Signing certificate into the Informatica default truststore file on each gateway node in the domain.
  4. Add Informatica as a relying party trust in AD FS and map LDAP attributes to the corresponding types used in security tokens issued by AD FS.
  5. Add the URL for each Informatica web application to AD FS.
  6. Enable single-sign on for Informatica web applications within the Informatica domain.

Updated October 10, 2019