Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. Single Sign-on for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Step 6. Enable SAML-based Single Sign-on

Step 6. Enable SAML-based Single Sign-on

You can enable SAML-based single sign-on in an existing Informatica domain, or you can enable it when you install or create a domain.
Select one of the following options:
Enable single-sign on when you install the Informatica services.
You can enable SAML-based single sign-on and specify the identity provider URL when you configure the domain as part of the installation process.
Enable single sign-on in an existing domain.
Use the infasetup updateSamlConfig command to enable single sign-on in an existing Informatica domain. You can run the command on any gateway node within the domain.
Shut down the domain before you run the command.
Specify the identity provider URL as the value for the
-iu
option. The following example shows the command usage:
infasetup updateSamlConfig -saml true -iu https://server.company.com/adfs/ls/
Enable single sign-on when you create a domain.
Use the infasetup defineDomain command to enable single sign-on when you create a domain.
The following example shows the SAML options as the final two options on the command line:
infasetup defineDomain -dn TestDomain -nn TestNode1 -na host1.company.com -cs "jdbc:informatica:oracle://host:1521;sid=xxxx" -du test_user -dp test_user -dt oracle -rf $HOME/ISP/BIN/nodeoptions.xml -ld $HOME/ISP/1011/source/logs -mi 10000 -ma 10200 -ad test_admin -pd test_admin -saml true -iu https://server.company.com/adfs/ls/


Updated October 10, 2019