Table of Contents

Search

  1. Preface
  2. Part 1: Installation Getting Started
  3. Part 2: Before You Install the Services
  4. Part 3: Run the Services Installer
  5. Part 4: After You Install the Services
  6. Part 5: Informatica Client Installation
  7. Part 6: Uninstallation
  8. Appendix A: Starting and Stopping Informatica Services
  9. Appendix B: Managing Distribution Packages
  10. Appendix C: Connecting to Databases from UNIX or Linux
  11. Appendix D: Connecting to Databases from Windows
  12. Appendix E: Updating the DynamicSections Parameter of a DB2 Database

Installation for PowerCenter and Data Quality

Installation for PowerCenter and Data Quality

Network Security - Service Principal Level

Network Security - Service Principal Level

After you specify the installation directory, you can configure security level.
  1. If you enable Kerberos network authentication, the
    Network Security - Service Principal Level
    appears.
    This image describes the network security information.
  2. On the
    Network Security - Service Principal Level
    page, select the level at which to set the Kerberos service principals for the domain.
    The following table describes the service principal levels that you can select:
    Level
    Description
    Process Level
    Configures the domain to use a unique service principal name (SPN) and keytab file for each node and each application service on a node.
    The number of SPNs and keytab files required for each node depends on the number of application service processes that run on the node. Use the process level option for domains that require a high level of security, such as productions domains.
    Node Level
    Configures the domain to share SPNs and keytab files on a node.
    This option requires one SPN and keytab file for the node and all application services that run on the node. It also requires a separate SPN and keytab file for all HTTP processes on the node.
    Use the node level option for domains that do not require a high level of security, such as test and development domains.
  3. Click
    Next
    .
The
Network Security - Kerberos Authentication
section appears.

0 COMMENTS

We’d like to hear from you!