Table of Contents

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Viewing Permission Details on an Operating System Profile

Viewing Permission Details on an Operating System Profile

When you view permission details, you can view the origin of effective permissions.
  1. On the Security tab, select the Operating System Profiles view.
  2. Select the operating system profile, and click the Permissions tab.
  3. Select the Groups or Users view.
  4. Enter the filter conditions to search for users and groups, and click the Filter button.
  5. Select a user or group and click View Permission Details.
    The Permission Details dialog box appears. The dialog box displays direct permissions assigned to the user or group, direct permissions assigned to parent groups, and permissions inherited from parent objects. In addition, permission details display whether the user or group is assigned the Administrator role which bypasses permission checking.
  6. Click Close.
  7. Or, click Edit Permissions to edit direct permissions.

Updated May 17, 2019


Explore Informatica Network