Table of Contents


  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Command Line Privileges and Permissions
  14. Custom Roles
  15. Default List of Cipher Suites

Secure Sources and Targets

Secure Sources and Targets

Informatica uses connection objects to connect to relational databases as source or target. You can create a connection object to a relational database that is secured with an SSL certificate.
You create PowerCenter connection objects in the Workflow Manager. You create Data Service , Data Quality, or Profiling connections in the Developer tool or in the Administrator tool.
You can create a connection to a secure source or target on the following databases:
  • Oracle
  • Microsoft SQL Server
  • IBM DB2

Updated June 26, 2020