Table of Contents

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Managing Roles

Managing Roles

A role is a collection of privileges that you can assign to users and groups. You can assign the following types of roles:
  • System-defined. Roles that you cannot edit or delete.
  • Custom. Roles that you can create, edit, and delete.
A role includes privileges for the domain or an application service type. You assign roles to users or groups for the domain or for each application service in the domain. For example, you can create a Developer role that includes privileges for the PowerCenter Repository Service. A domain can contain multiple PowerCenter Repository Services. You can assign the Developer role to a user for the Development PowerCenter Repository Service. You can assign a different role to that user for the Production PowerCenter Repository Service.
When you select a role in the Roles section of the Navigator, you can view all users and groups that have been directly assigned the role for the domain and application services. You can view the role assignments by users and groups or by services. To navigate to a user or group listed in the Assignments section, right-click the user or group and select Navigate to Item.
You can search for system-defined and custom roles.

Updated July 24, 2019


Explore Informatica Network