Table of Contents

Search

  1. Preface
  2. Part 1: Version 10.5.6
  3. Part 2: Version 10.5.5 - 10.5.5.x
  4. Part 3: Version 10.5.4 - 10.5.4.x
  5. Part 4: Version 10.5.3 - 10.5.3.x
  6. Part 5: Version 10.5.2 - 10.5.2.1.x
  7. Part 6: Version 10.5.1 - 10.5.1.1
  8. Part 7: Versions 10.5 - 10.5.0.1
  9. Part 8: Versions 10.4.1 - 10.4.1.3
  10. Part 9: Versions 10.4 - 10.4.0.2
  11. Part 10: Versions 10.2.2 - 10.2.2 HotFix 1
  12. Part 11: Version 10.2.1
  13. Part 12: Version 10.2 - 10.2 HotFix 2

What's New and Changed (10.5.6)

What's New and Changed (10.5.6)

Kerberos Constrained Delegation

Kerberos Constrained Delegation

Effective in version 10.5.1, you can configure an Informatica domain that uses Kerberos authentication to use constrained delegation.
Configure constrained delegation when you want to restrict access to services using delegated authentication. You can use this method to restrict the additional services to which a Kerberos-authenticated user or service can request access.
For more information, see the
Informatica 10.5.1 Security Guide
.

0 COMMENTS

We’d like to hear from you!