Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Security Guide

Security Guide

Prepare to Import Active Directory User Accounts

Prepare to Import Active Directory User Accounts

Complete the following steps to prepare to import user accounts from Azure Active Directory into an Informatica domain:
  1. Verify that port 636, which is the Azure Active Directory secure LDAP port, is accessible through your firewall.
  2. Enable secure LDAP authentication in Azure Active Directory Domain Services.
    You use the Azure portal to enable secure LDAP in Azure Active Directory Domain Services. For information about configuring secure LDAP in Azure Active Directory Domain Services, see the following link:
  3. When you configure the secure LDAP certificate in Azure Active Directory Domain Services, ensure that the Subject name on the certificate is the Fully Qualified Domain Name (FQDN) of Azure Active Directory.
  4. Convert the secure LDAP certificate from the PFX format to the PEM format. Java requires that the certificate is in the PEM format.
  5. Import the certificates used by all domain nodes into the Java
    cacerts
    truststore file in the following directory on a single gateway node in the domain:
    <Informatica installation directory>/java/jre/lib/security/
  6. Copy the
    cacerts
    file that contains the imported certificates to the same directory on every other gateway node in the domain.
  7. Add the Azure Active Directory public IP address and the Fully Qualified Domain Name (FQDN) of Azure Active Directory to the /etc/hosts file on each gateway node in the domain. Use the following format:
    <Azure Active Directory host IP address> ldaps.<FDQN of Azure Active Directory>

0 COMMENTS

We’d like to hear from you!