Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Security Guide

Security Guide

Operator Custom Role

Operator Custom Role

The Operator custom role includes privileges for managing, scheduling, and monitoring application services.
The following table lists the default privileges assigned to the Operator custom role:
Privilege Group
Privilege Name
Application Administration
Manage Applications
Domain Administration
Manage Service Execution
Model Repository Service Administration
Manage Team-based Development
Monitoring
The Monitoring privilege group includes the following privileges:
  • View: View Jobs of Other Users
  • View: View Statistics
  • View: View Reports
  • Access Monitoring: Access from Analyst Tool
  • Access Monitoring: Access from Developer Tool
  • Access Monitoring: Access from Administrator Tool
  • Perform Actions on Jobs
In a domain that uses Kerberos authentication, users must also have the Administrator role for the Model Repository Service that is configured for monitoring.
Scheduler
The Scheduler privilege group includes the following privileges:
  • Manage Scheduled Jobs: Create Schedule
  • Manage Scheduled Jobs: Delete Schedule
  • Manage Scheduled Jobs: Edit Schedule
  • Manage Scheduled Jobs: View Schedules
Tools
Access Informatica Administrator

0 COMMENTS

We’d like to hear from you!