Table of Contents

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Enable Delegation for the Kerberos Principal User Accounts in Active Directory

Enable Delegation for the Kerberos Principal User Accounts in Active Directory

Enable delegation for each Kerberos principal user account you created in Active Directory.
Delegated authentication happens when a user is authenticated with one service, and that service uses the credentials of the authenticated user to connect to another service. Because services in the Informatica domain need to connect to other services to complete an operation, the Informatica domain requires the delegation option to be enabled in Active Directory.
You must enable delegation for all accounts for all of the accounts you created, except for the LDAP bind user account that you use to access and search Active Directory during LDAP synchronization. Set delegation to Trust this user for delegation to any service (Kerberos only) in the Delegation tab in the properties dialog box for each user account.
The Delegation tab is not available in the properties dialog box until you run ktpass to create the keytab files.
The following image shows the Delegation tab in the nodeuser01 account properties dialog box:
On the Delegation tab in the user account properties dialog box in Active Directory, select the Trust this user for delegation to any service (Kerberos only) option for each Kerberos principal user account that you created.

Updated July 24, 2019


Explore Informatica Network