Table of Contents

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Monitor Run-time Objects Privilege

Monitor Run-time Objects Privilege

Users assigned the Monitor Run-time Objects privilege can Monitor workflows and tasks in the Workflow Monitor.
The following table lists the required permissions and the actions that users can perform with the Monitor Run-time Objects privilege:
Permission
Grants Users the Ability To
Read on folder
User is able to perform the following actions:
  • View properties of run-time objects in the Workflow Monitor.
  • View session and workflow logs in the Workflow Monitor.
  • View run-time object and performance details in the Workflow Monitor.
When the PowerCenter Integration Service runs in safe mode, users must have the Administrator role for the associated PowerCenter Repository Service.

Updated May 17, 2019


Explore Informatica Network