Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Security Guide

Security Guide

Connection Permissions

Connection Permissions

Permissions control the level of access that a user or group has on the connection.
You can configure permissions on a connection in the Analyst tool, Developer tool, or Administrator tool.
Any connection permission that is assigned to a user or group in one tool also applies in other tools. For example, you grant GroupA permission on ConnectionA in the Developer tool. GroupA has permission on ConnectionA in the Analyst tool and Administrator tool also.
Any connection permission that is assigned to a user or group in one tool also applies in other tools. For example, you grant GroupA permission on ConnectionA in the Developer tool. GroupA has permission on ConnectionA in the Administrator tool also.
The following Informatica components use the connection permissions:
  • Administrator tool. Enforces read, write, and execute permissions on connections.
  • Analyst tool. Enforces read, write, and execute permissions on connections.
  • Informatica command line interface. Enforces read, write, and grant permissions on connections.
  • Developer tool. Enforces read, write, and execute permissions on connections.
    For SQL data services, the Developer tool does not enforce connection permissions. Instead, it enforces column-level and pass-through security to restrict access to data.
  • Data Integration Service. Enforces execute permissions when a user tries to preview data or run a mapping, scorecard, or profile.
You cannot assign permissions on the following connections: profiling warehouse, data object cache database, or Model repository.

0 COMMENTS

We’d like to hear from you!