Table of Contents

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Application and Application Object Permissions

Application and Application Object Permissions

Permissions control the level of access that a user or group has on applications and application objects such as mappings and workflows.
You can configure application and application object permissions in the Administrator tool or from the command line.

Updated July 24, 2019


Explore Informatica Network