Table of Contents

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

infacmd cluster Commands

infacmd cluster Commands

To run infacmd cluster commands, users must have one of the listed sets of domain privileges and cluster configuration permissions.
The following table lists the required privileges and permissions for infacmd cluster commands:
infacmd cluster CommandPrivilege GroupPrivilege NamePermission On...
clearConfigurationProperties Domain Administration Manage Connections Write on cluster configuration
createConfiguration Domain Administration Manage Connections Write on cluster configurations
deleteConfiguration Domain Administration Manage Connections Write on cluster configurations
exportConfiguration with sensitive properties - - Write on cluster configuration
exportConfiguration without sensitive properties - - Read on cluster configurations
listAssociatedConnections - - -
listConfigurations - - -
listConfigurationGroupPermissions - - -
listConfigurationProperties - - Read on cluster configurations
listConfigurationSets - - Read on cluster configurations
listConfigurationUserPermissions - - -
refreshConfiguration Domain Administration Manage Connections Write on cluster configurations
setConfigurationPermissions - - Grant on cluster configuration
setConfigurationProperties Domain Administration Manage Connections Write on cluster configurations


Updated October 10, 2019


Explore Informatica Network