Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Security Guide

Security Guide

Types of Connection Permissions

Types of Connection Permissions

You can assign different permission types to users to perform the following actions:
Action
Permission Types
View all connection metadata, except passwords, such as connection name, type, description, connection strings, and user names.
Read
Edit all connection metadata, including passwords. Delete the connection. Users with Write permission inherit Read permission.
Write
Access the physical data in the underlying data source defined by the connection. Users can preview data, run a mapping, run a mapping in a workflow Mapping task, run a scorecard, or run a profile that uses the connection.
Execute
Grant and revoke permissions on connections.
Grant

0 COMMENTS

We’d like to hear from you!