Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Security Guide

Security Guide

Default Keystore and Truststore Directory

Default Keystore and Truststore Directory

The Informatica deployment includes default keystore and truststore files in the directory
<Informatica installation directory>\services\shared\security
.
Informatica recommends that you use the default keystore and truststore only for setup and proof-of-concept use cases. To secure a production environment, use the following guidelines:
  • Configure a custom keystore and truststore for SAML authentication in a location other than the default directory:
    <Informatica installation directory>\services\shared\security
  • You cannot use the default keystore and truststore to configure other services or clients.
  • When you enable SAML authentication, you import keystore or truststore certificate files and private keys into the default directory:
    <Informatica installation directory>\services\shared\security
  • When you assign an alias to the keystore or truststore, do not use "Informatica LLC," which Informatica uses for private key authentication and certificate signing.
  • Modifying the default SAML keystore or truststore is allowed only when the default directory is configured as the SAML keystore and truststore directory and you want to import private key and certificate entries in the default keystore or truststore.
    You cannot use "Informatica LLC" as the alias for new entries in default keystore and truststore. You can use "Informatica LLC" as the alias for custom keystore-truststore entries.
    No other operation is allowed for the default keystore and truststore files, including deleting or replacing the files, changing the password of the keystore or truststore, or modifying, removing or replacing the Informatica-generated private key and signing certificate.

0 COMMENTS

We’d like to hear from you!