Table of Contents

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Design Objects Privilege Group

Design Objects Privilege Group

Privileges in the Design Objects privilege group and PowerCenter repository object permissions determine actions users can perform on the following design objects:
  • Business components
  • Mapping parameters and variables
  • Mappings
  • Mapplets
  • Transformations
  • User-defined functions
Users assigned permissions but no privileges can perform some actions for design objects. The following table lists the actions that users can perform when they are assigned permissions only:
Permission
Description
Read on folder
User is able to perform the following actions:
  • Compare design objects.
  • Copy design objects as an image.
  • Export design objects.
  • Generate code for Custom transformation and external procedures.
  • Receive PowerCenter repository notification messages.
  • Run data lineage on design objects. Users must also have the View Lineage privilege for the Metadata Manager Service and read permission on the metadata objects in the Metadata Manager catalog.
  • Search for design objects.
  • View design objects, design object dependencies, and design object history.
Read on shared folder
Read and Write on destination folder
User is able to create shortcuts.
To perform actions on design objects, users must also have the appropriate privilege in the Tools privilege group.

Updated July 24, 2019


Explore Informatica Network