Table of Contents

Search

  1. Preface
  2. Part 1: Installation Getting Started
  3. Part 2: Before You Install the Services
  4. Part 3: Run the Services Installer
  5. Part 4: After You Install the Services
  6. Part 5: Informatica Client Installation
  7. Part 6: Uninstallation
  8. Appendix A: Starting and Stopping Informatica Services
  9. Appendix B: Managing Distribution Packages
  10. Appendix C: Connecting to Databases from UNIX or Linux
  11. Appendix D: Connecting to Databases from Windows
  12. Appendix E: Updating the DynamicSections Parameter of a DB2 Database

Installation for PowerCenter and Data Quality

Installation for PowerCenter and Data Quality

User Authentication

User Authentication

When you run the installer, you can choose the authentication to use for the domain.
The Informatica domain can use the following types of authentication to authenticate users in the domain:
  • Native. Native user accounts are stored in the domain and can only be used within the domain. Native authentication is default.
  • LDAP. LDAP user accounts are stored in an LDAP directory service and are shared by applications within the enterprise. You can configure LDAP authentication after you run the installer.
  • SAML. You can configure Security Assertion Markup Language (SAML) authentication for the Administrator tool, the Analyst tool, and the Monitoring tool. You can configure SAML authentication after you run the installer.
  • Kerberos. Kerberos user accounts are stored in an LDAP directory service and are shared by applications within the enterprise. If you enable Kerberos authentication during installation, you must configure the Informatica domain to work with the Kerberos Key Distribution Center (KDC).
You need to plan the type of authentication that you want to use in the domain. If you want the installer to configure Kerberos authentication, you must prepare the network prior to installation. You can also configure Kerberos after installation. Note that you cannot configure both SAML and Kerberos authentication.

0 COMMENTS

We’d like to hear from you!