Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Getting started
  3. Before you begin
  4. Installing Secure Agents
  5. Create a CDI-PC domain
  6. Join a CDI-PC domain
  7. Run the silent installer
  8. Resuming an installation
  9. Before you migrate the Informatica domain
  10. Migrate the domain
  11. Migrate the domain with changes to node configuration
  12. Migrate the domain in silent mode
  13. After you migrate the domain
  14. Install the CDI-PC Client
  15. EBF installation
  16. Uninstall Cloud Data Integration for PowerCenter (CDI-PC)
  17. Uninstalling the CDI-PC Client
  18. Uninstalling the Secure Agent
  19. Appendix A: CDI-PC components

Installation Guide

Installation Guide

Set up keystore and truststore files for the CDI-PC domain

Set up keystore and truststore files for the
CDI-PC domain

CDI-PC
requires a TLS setup with custom certificates. You can't use the default certificates available with the Informatica domain. Generate keystore and truststore certificates to use with
CDI-PC
. If you use custom certificates that don't include SAN information for host name validation in your Informatica domain, you can't use the same certificates.
Set up files for secure communication within the
CDI-PC domain
and for a secure connection to the Administrator tool and Secure Agent.
CDI-PC
requires certificates configured for host name validation. Ensure that the host name mentioned in the certificate matches the host that you apply it on. To create the required files, you can use the following programs:
keytool
You can use keytool to create a TLS certificate or a Certificate Signing Request (CSR) as well as keystores and truststores in JKS format.
OpenSSL
You can use OpenSSL to create a TLS certificate or CSR as well as convert a keystore in JKS format to PEM format.
For more information about OpenSSL, see the documentation on the following website: https://www.openssl.org/docs/
For a higher level of security, send your CSR to a Certificate Authority (CA) to get signed certificates. If you use CA-signed certificates, you get a certificate chain with an ordered list of certificates that include the root certificate, one or more intermediate certificates, and the user certificate. Enter all certificates in the chain when you generate the PEM format.
For information about how to generate and configure custom keystore and truststore certificates, see the following KB article: Configure keystore and truststore for Cloud Data Integration for PowerCenter
The software available for download at the referenced links belongs to a third party or third parties, not Informatica. The download links are subject to the possibility of errors, omissions or change. Informatica assumes no responsibility for such links and/or such software, disclaims all warranties, either express or implied, including but not limited to, implied warranties of merchantability, fitness for a particular purpose, title and non-infringement, and disclaims all liability relating thereto.

Secure communication within the domain

Before you enable secure communication within the domain, verify that the following requirements are met:
You created a certificate signing request (CSR) and private key.
You can use keytool or OpenSSL to create the CSR and private key.
Note that RSA encryption requires more than 512 bits.
You have a signed TLS certificate.
The certificate can be self-signed or CA signed. Informatica recommends a CA signed certificate.
You imported the certificate into keystores.
Ensure that you have keystores in the following formats:
  • PEM format, named infa_keystore.pem
  • JKS format, named infa_keystore.jks
If you use CA-signed certificates, ensure that the keystore files contain the root and intermediate TLS certificates.
Use the same password for the keystore in JKS format and the private key pass phrase used to generate the TLS certificate.
You imported the certificate into truststores.
Ensure that you have truststores in the following formats:
  • PEM format, named infa_truststore.pem
  • JKS format, named infa_truststore.jks
Ensure that the truststore files contain the root, intermediate, and end user TLS certificates.
The keystores and truststores are in the correct directory.
Ensure that the keystore and truststore are in a directory that is accessible to the installer.

Secure connection to the Administrator tool

Before you secure the connection to the Administrator tool, verify that the following requirements are met:
You created a certificate signing request (CSR) and private key.
You can use keytool or OpenSSL to create the CSR and private key.
Note that RSA encryption requires more than 512 bits.
You have a signed TLS certificate.
The certificate can be self-signed or CA signed. Informatica recommends a CA signed certificate.
You imported the certificate into a keystore in JKS format.
A keystore can't contain more than one certificate. If you use a unique certificate for each web application service, create a separate keystore for each certificate. Alternatively, you can use a shared certificate and keystore.

0 COMMENTS

We’d like to hear from you!