Table of Contents

Search

  1. Preface
  2. Part 1: Installation Getting Started
  3. Part 2: Before You Install the Services
  4. Part 3: Run the Services Installer
  5. Part 4: After You Install the Services
  6. Part 5: Informatica Client Installation
  7. Part 6: Uninstallation
  8. Appendix A: Starting and Stopping Informatica Services
  9. Appendix B: Connecting to Databases from UNIX or Linux
  10. Appendix C: Connecting to Databases from Windows
  11. Appendix D: Updating the DynamicSections Parameter of a DB2 Database

Installation for PowerCenter and Data Quality

Installation for PowerCenter and Data Quality

Secure Files and Directories

Secure Files and Directories

When you install or upgrade Informatica, the installer creates directories to store Informatica files that require restricted access, such as the domain encryption key file and the nodemeta.xml. The installer assigns different permissions for the directories and the files in the directories.
By default, the installer creates the following directories within the Informatica installation directory:
<Informatica installation directory>/isp/config
Contains the nodemeta.xml file. Also contains the /keys directory where the encryption key file is stored. If you configure the domain to use Kerberos authentication, the /keys directory also contains the Kerberos keytab files. You can specify a different directory in which to store the files. The installer assigns the same permissions to the specified directory as the default directory.
<Informatica installation directory>/services/shared/security
If you enable secure communication for the domain, the /security directory contains the keystore and truststore files for the default SSL certificates.
To maintain the security of the directories and files, the installer restricts access to the directories and the files in the directories. The installer assigns specific permissions to the group and user account that own the directories and files.
For more information about permissions assigned to the directories and files, see the Informatica Security Guide.

0 COMMENTS

We’d like to hear from you!