Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Security Guide

Security Guide

Enable Delegation for the Kerberos Principal User Accounts in Active Directory

Enable Delegation for the Kerberos Principal User Accounts in Active Directory

Enable delegation for each Kerberos principal user account you created in Active Directory.
Delegated authentication happens when a user is authenticated with one service, and that service uses the credentials of the authenticated user to connect to another service. Because services in the Informatica domain need to connect to other services to complete an operation, the Informatica domain requires the delegation option to be enabled in Active Directory.
You must enable delegation for all accounts for all of the accounts you created, except for the LDAP bind user account that you use to access and search Active Directory during LDAP synchronization. Set delegation to
Trust this user for delegation to any service (Kerberos only)
in the Delegation tab in the properties dialog box for each user account.
The Delegation tab is not available in the properties dialog box until you run ktpass to create the keytab files.
The following image shows the Delegation tab in the nodeuser01 account properties dialog box:
On the Delegation tab in the user account properties dialog box in Active Directory, select the Trust this user for delegation to any service (Kerberos only) option for each Kerberos principal user account that you created.

0 COMMENTS

We’d like to hear from you!