Table of Contents

Search

  1. About the Security Guide
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos Authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Security Guide

Security Guide

Request Signing

Request Signing

You can enable request signing during the install-upgrade process or after install-upgrade by using infasetup.
During the installation or upgrade process, check the
Signed request
option in the installer utility.
After the installation or upgrade process, set up request signing using infasetup.
You can also configure request signing for the web applications using the Administrator tool or the web application user interface.

0 COMMENTS

We’d like to hear from you!