Table of Contents

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Sources and Targets Privilege Group

Sources and Targets Privilege Group

Privileges in the Sources and Targets privilege group and PowerCenter repository object permissions determine actions users can perform on the following source and target objects:
  • Cubes
  • Dimensions
  • Source definitions
  • Target definitions
Users assigned permissions but no privileges can perform some actions for source and target objects. The following table lists the actions that users can perform when they are assigned permissions only:
Permission
Description
Read on folder
User is able to perform the following actions:
  • Compare source and target objects.
  • Export source and target objects.
  • Preview source and target data.
  • Receive PowerCenter repository notification messages.
  • Run data lineage on source and target objects. Users must also have the View Lineage privilege for the Metadata Manager Service and read permission on the metadata objects in the Metadata Manager catalog.
  • Search for source and target objects.
  • View source and target objects, source and target object dependencies, and source and target object history.
Read on shared folder
Read and Write on destination folder
Create shortcuts.
To perform actions on source and target objects, users must also have the appropriate privilege in the Tools privilege group.

Updated May 17, 2019


Explore Informatica Network