Table of Contents

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Operator Custom Role

Operator Custom Role

The Operator custom role includes privileges for managing, scheduling, and monitoring application services.
The following table lists the default privileges assigned to the Operator custom role:
Privilege Group Privilege Name
Application Administration Manage Applications
Domain Administration Manage Service Execution
Model Repository Service Administration Manage Team-based Development
Monitoring The Monitoring privilege group includes the following privileges:
  • View: View Jobs of Other Users
  • View: View Statistics
  • View: View Reports
  • Access Monitoring: Access from Analyst Tool
  • Access Monitoring: Access from Developer Tool
  • Access Monitoring: Access from Administrator Tool
  • Perform Actions on Jobs
In a domain that uses Kerberos authentication, users must also have the Administrator role for the Model Repository Service that is configured for monitoring.
Scheduler The Scheduler privilege group includes the following privileges:
  • Manage Scheduled Jobs: Create Schedule
  • Manage Scheduled Jobs: Delete Schedule
  • Manage Scheduled Jobs: Edit Schedule
  • Manage Scheduled Jobs: View Schedules
Tools Access Informatica Administrator

Updated May 17, 2019


Explore Informatica Network