Table of Contents

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Cluster Configuration Permissions

Cluster Configuration Permissions

Permissions control the level of access that a user or group has on a cluster configuration.
You can configure permissions on a cluster configuration in the Administrator tool and the Informatica command line interface.
A user or group can have the following permissions on a cluster configuration:
  • Read. The user or group members can view the cluster configuration.
  • Write. The user or group members can edit the cluster configuration. Includes read permission.
  • Execute. The user or group members can run mappings in the Hadoop environment.
  • Grant. The user or group members can grant permission on the cluster configuration to other users and groups. Includes read permission.
  • All. The user inherits all allowed permissions.
By default, all users have permission to view the cluster configuration name.
For information about cluster configuration permissions, refer to the Informatica Big Data Management Administrator Guide.

Updated May 17, 2019


Explore Informatica Network