Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Viewing Permission Details on an Application or Application Object

Viewing Permission Details on an Application or Application Object

When you view permission details, you can view the origin of effective permissions.
  1. On the Manage tab, select the Services and Nodes view.
  2. In the Navigator, select a Data Integration Service.
  3. In the contents panel, select the Applications view.
  4. Select the application, mapping, or workflow.
  5. In the details panel, select the Group Permissions or User Permissions view.
  6. Enter the filter conditions to search for users and groups, and click the Filter button.
  7. Select a user or group and click the View Permission Details button.
    The Permission Details dialog box appears. The dialog box displays direct permissions assigned to the user or group, direct permissions assigned to parent groups, and permissions inherited from parent objects. In addition, permission details display whether the user or group is assigned the Administrator role which bypasses permission checking.
  8. Click Close.
  9. Or, click Edit Permissions to edit direct permissions.


Updated October 10, 2019


Explore Informatica Network