Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Security Guide

Security Guide

Configure Informatica Administrator to Use an Identity Provider

Configure Informatica Administrator to Use an Identity Provider

Use the Administrator tool to configure the Administrator tool or the monitoring application to use a SAML identity provider. You configure the Administrator tool or the monitoring application to use an identity provider on the node where the application runs.
  1. In the Administrator tool, click the
    Services and Nodes
    tab.
  2. Select the gateway node where the Administrator tool and the monitoring application run in the Domain Navigator.
  3. Click the edit icon next to SAML Configuration.
  4. Enter the properties required to enable the application to use an identity provider.
    The following table describes the properties you enter:
    Property
    Description
    Identity Provider URL
    Optional. The URL for the identity provider server. You must specify the complete URL string.
    Service Provider ID
    Optional. The relying party trust name or the service provider identifier for the domain as defined in the identity provider.
    Assertion Signing Certificate Alias
    Optional. The alias name specified when importing the identity provider assertion signing certificate into the truststore file used for SAML authentication.
    If you change the alias name, import the corresponding certificate into the truststore file on each gateway node, and then restart the node.
    Clock Skew Tolerance
    Optional. The allowed time difference between the identity provider host system clock and the system clock on the master gateway node.
    Optional. The lifetime of SAML tokens issued by the identity provider by is set according to the identity provider host system clock. The lifetime of a SAML token issued by the identity provider is valid if the start time or end time set in the token is within the specified number seconds of the system clock on the master gateway node.
    Values must be from 0 to 600 seconds. Set to -1 to use the value configured for the domain. Default is 120 seconds.
    The following image shows the configuration to enable the Administrator tool to use AD FS as the identity provider. If you do not specify a value for a property, the domain uses the value set in the default SAML configuration.
  5. Click
    OK
    .
  6. Restart the application.

0 COMMENTS

We’d like to hear from you!