Table of Contents

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Security Domains
  5. Kerberos Authentication
  6. Domain Security
  7. SAML Authentication for Informatica Web Applications
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Manage Source and Target Versions Privilege

Manage Source and Target Versions Privilege

If you have a team-based development option, assign users the Manage Source and Target Versions privilege in a versioned PowerCenter repository. Users can change the status, recover, and purge versions of source and target objects. Users can also check in and undo checkouts made by other users.
The Manage Source and Target Versions privilege includes the Create, Edit, and Delete Sources and Targets privilege.
The following table lists the required permissions and the actions that users can perform with the Manage Source and Target Versions privilege:
Permission
Description
Read and Write on folder
User is able to perform the following actions:
  • Change the status of source and target objects.
  • Check in and undo checkouts of source and target objects checked out by other users.
  • Purge versions of source and target objects.
  • Recover deleted source and target objects.

Updated May 17, 2019


Explore Informatica Network