Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Security Guide

Security Guide

Enable Resource-based Constrained Delegation with S4U2Self

Enable Resource-based Constrained Delegation with S4U2Self

Make sure that the forwardable flag is set to true in libdefaults section of krb5.conf file.
You can configure Resource-based Constrained Delegation only through powershell commands. Make sure powershell is started by a user with required privileges to change the properties of KDC accounts, preferably a KDC administrator.
To enable Resource-based Constrained Delegation with S4U2Self, perform the following steps every Informatica keytab account on the KDC server:
  1. Right-click the user account and select
    Properties
    .
    The
    Properties
    dialog box appears.
  2. On the
    Delegation
    tab, select
    Do not trust this computer for delegation
    .
  3. Click
    Apply
    .
  4. Run the following command to set the
    PrincipalsAllowedToDelegateToAccount
    attribute:
    $IntermediateService = Get-ADUser -Identity <Intermediate server account's samAccountName> -Properties *
    Set-ADUser -Identity <Targer server account's samAccountName> -PrincipalsAllowedToDelegateToAccount $IntermediateService1, $IntermediateService2, $IntermediateService3
    You can use comma separated values to add multiple accounts in the
    PrincipalsAllowedToDelegateToAccount
    attribute.
  5. If you want to unset the
    PrincipalsAllowedToDelegateToAccount
    attribute, run the following command:
    Set-ADUser -Identity <Targer server account's samAccountName> PrincipalsAllowedToDelegateToAccount $null
  6. To view existing principals in
    PrincipalsAllowedToDelegateToAccount
    list, run following commands:
    $FormatEnumerationLimit=-1
    Get-ADUser -Identity <sam account name> -properties
    PrincipalsAllowedToDelegateToAccount
    By default, powershell command output shows four values in the service principal list in the output. Set this parameter to -1 to show the complete list of principals.

0 COMMENTS

We’d like to hear from you!