Table of Contents

Search

  1. About the Test Data Management Installation Guide
  2. Test Data Management Installation Overview
  3. Before You Install TDM
  4. Prepare for Application Services and Databases
  5. Create the Application Services
  6. Install the Clients
  7. TDM Installation
  8. After You Install TDM
  9. Infacmd
  10. Starting and Stopping Informatica and TDM
  11. Uninstallation
  12. Updating the DynamicSections Parameter of a DB2 Database

Installation Guide

Installation Guide

Set Up a Keystore File

Set Up a Keystore File

You can optionally set up a secure connection to the TDM Server.
You can also choose to set up a secure connection to the test data warehouse.
When you configure the Test Data Manager Service, you can configure secure communication between Test Data Manager and the TDM Server. Set up a keystore file and provide the location of the file when you create the Test Data Manager Service to create a secure connection.
When you configure the Test Data Warehouse Service, you can configure secure communication between Test Data Manager and the test data warehouse. Set up a keystore file and provide the location of the file when you create the Test Data Warehouse Service to create a secure connection.
To create the required files, you can use the following programs:
keytool
You can use keytool to create an SSL certificate or a Certificate Signing Request (CSR) as well as keystores and truststores in JKS format.
For more information about using keytool, see the documentation on the following web site: http://docs.oracle.com/javase/7/docs/technotes/tools/windows/keytool.html.
OpenSSL
You can use OpenSSL to create an SSL certificate or CSR as well as convert a keystore in JKS format to PEM format.
For more information about OpenSSL, see the documentation on the following website: https://www.openssl.org/docs/
For a higher level of security, send your CSR to a Certificate Authority (CA) to get a signed certificate.
The software available for download at the referenced links belongs to a third party or third parties, not Informatica LLC. The download links are subject to the possibility of errors, omissions or change. Informatica assumes no responsibility for such links and/or such software, disclaims all warranties, either express or implied, including but not limited to, implied warranties of merchantability, fitness for a particular purpose, title and non-infringement, and disclaims all liability relating thereto.

Secure Communication Within the Informatica Domain

Before you enable secure communication within the Informatica domain, verify that the following requirements are met:
You created a certificate signing request (CSR) and private key.
You can use keytool or OpenSSL to create the CSR and private key.
If you use RSA encryption, you must use more than 512 bits.
You have a signed SSL certificate.
The certificate can be self-signed or CA signed. Informatica recommends a CA signed certificate.
You imported the certificate into keystores.
You must have a keystore in PEM format named
infa_keystore.pem
and a keystore in JKS format named
infa_keystore.jks
.
The keystore files must contain the root and intermediate SSL certificates.
The password for the keystore in JKS format must be the same as the private key pass phrase used to generate the SSL certificate.
You imported the certificate into truststores.
You must have a truststore in PEM format named
infa_truststore.pem
and a truststore in JKS format named
infa_truststore.jks
.
The truststore files must contain the root, intermediate, and end user SSL certificates.
The keystores and truststores are in the correct directory.
The keystore and truststore must be in a directory that is accessible to the installer.
For more information about how to create a custom keystore and truststore, see the Informatica How-To Library article "How to Create Keystore and Truststore Files for Secure Communication in the Informatica Domain": https://kb.informatica.com/h2l/HowTo%20Library/1/0700-CreateKeystoresAndTruststores-H2L.pdf

Secure Connection to Test Data Manager

Before you secure the connection to Test Data Manager, verify that the following requirements are met:
You created a certificate signing request (CSR) and private key.
You can use keytool or OpenSSL to create the CSR and private key.
If you use RSA encryption, you must use more than 512 bits.
You have a signed SSL certificate.
The certificate can be self-signed or CA signed. Informatica recommends a CA signed certificate.
You imported the certificate into a keystore in JKS format.
A keystore must contain only one certificate. If you use a unique certificate for each web application service, create a separate keystore for each certificate. Alternatively, you can use a shared certificate and keystore.
If you use the installer-generated SSL certificate for the Administrator tool, you do not need to import the certificate into a keystore in JKS format.
The keystore is in the correct directory.
The keystore must be in a directory that is accessible to the installer.

0 COMMENTS

We’d like to hear from you!