Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Security Guide

Security Guide

Enable Kerberos Authentication in the Domain

Enable Kerberos Authentication in the Domain

Enable Kerberos on a gateway node within the domain.
Run the infasetup switchToKerberosMode command on a gateway node within the domain to change the authentication to Kerberos network authentication.
  1. Shut down the domain and all Informatica services. Shut down the services in the following order:
    • Metadata Manager Service
    • PowerCenter® Integration Service
    • PowerCenter® Repository Service
    • Content Management Service
    • Analyst Service
    • Data Integration Service
    • Model Repository Service
  2. At the command prompt on a gateway node, switch to the directory where the infasetup executable is located:
    <Informatica installation directory>\isp\bin
  3. Run the following command:
    infasetup switchToKerberosMode -ad <administrator name> -srn <Kerberos realm names> -urn <Kerberos realm names> -spnSL <service principal level>
    The following table describes the options and arguments for the infasetup switchToKerberosMode command:
    Option
    Argument
    Description
    -administratorName
    -ad
    user_name
    User name for the domain administrator account that is created when you configure Kerberos authentication. Specify the name of an account that exists in Active Directory.
    After you configure Kerberos authentication, this user is included in the
    _infaInternalNamespace
    security domain that the command creates.
    If the domain uses a single Kerberos realm to authenticate users, specify the samAccount name of the account you want to use as the administrator account.
    If the domain uses Kerberos cross realm authentication, specify the fully qualified user principal name of the account you want to use as the administrator account, including the realm name. For example:
    sysadmin@COMPANY.COM
    -ServiceRealmName
    -srn
    Kerberos_realm_name
    Name of the Kerberos realm that the domain uses to authenticate users. The realm name must be in uppercase and is case-sensitive.
    To configure Kerberos cross realm authentication, specify the name of each Kerberos realm that the domain uses to authenticate users, separated by a comma. For example:
    COMPANY.COM,EAST.COMPANY.COM,WEST.COMPANY.COM
    Use an asterisk as a wildcard character before a realm name to include all realms that include the name. For example:
    *EAST.COMPANY.COM
    -UserRealmName
    -urn
    Kerberos_realm_name
    Name of the Kerberos realm that the domain uses to authenticate users. The realm name must be in uppercase and is case-sensitive.
    To configure Kerberos cross realm authentication, specify the name of each Kerberos realm that the domain uses to authenticate users, separated by a comma. For example:
    COMPANY.COM,EAST.COMPANY.COM,WEST.COMPANY.COM
    Use an asterisk as a wildcard character before a realm name to include all realms that include the name. For example:
    *EAST.COMPANY.COM
    -SPNShareLevel
    -spnSL
    NODE|PROCESS
    Service principal level for the domain.
    Set to NODE to enable Kerberos at the node level.
    Set to PROCESS to enable Kerberos at the process level.
    The following example changes the domain authentication to Kerberos and sets the sysadmin user account as the administrator account in a domain that uses a single Kerberos realm to authenticate users:
    infasetup switchToKerberosMode -ad sysadmin -srn COMPANY.COM -urn COMPANY.COM –spnSL NODE
    The following example changes the domain authentication to Kerberos and sets the sysadmin user account as the administrator account in a domain that uses Kerberos cross realm authentication:
    infasetup switchToKerberosMode -ad sysadmin@COMPANY.COM -srn COMPANY.COM,COMPANY.EAST.COM,COMPANY.WEST.COM -urn COMPANY.COM,COMPANY.EAST.COM,COMPANY.WEST.COM –spnSL NODE

0 COMMENTS

We’d like to hear from you!