Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Getting started
  3. Before you begin
  4. Installing Secure Agents
  5. Create a CDI-PC domain
  6. Join a CDI-PC domain
  7. Run the silent installer
  8. Resuming an installation
  9. Before you migrate the Informatica domain
  10. Migrate the domain
  11. Migrate the domain with changes to node configuration
  12. Migrate the domain in silent mode
  13. After you migrate the domain
  14. Install the CDI-PC Client
  15. EBF installation
  16. Uninstall Cloud Data Integration for PowerCenter (CDI-PC)
  17. Uninstalling the CDI-PC Client
  18. Uninstalling the Secure Agent
  19. Appendix A: CDI-PC components

Installation Guide

Installation Guide

Configure domain settings and secure communication

Configure domain settings and secure communication

Choose to create a domain and enter port and keystore file information to configure secure configuration between the
CDI-PC domain
and the Administrator tool.
  1. Press
    1
    to create a domain.
  2. Enter the HTTPS port number for the Administrator tool. Default is 8443.
  3. Enter the absolute path to the custom keystore file to configure secure communication between the Administrator tool and the domain.
    Use the keystore that's in .jks format.
  4. Enter the keystore password.
  5. Choose whether to enable SAML authentication to configure Security Assertion Markup Language (SAML)-based single sign-on (SSO) support for web-based Informatica applications in a
    CDI-PC domain
    .
    Press
    1
    to enable and configure SAML authentication. Press
    2
    to disable SAML authentication and skip to Configure secure communication in the domain. Default is Yes.
  6. Enter the Identity Provider URL for the domain.
  7. Specify the relying party trust name or the service provider identifier for the domain as defined in the identity provider. If you choose No, the service provider identifier is set to "Informatica" .
  8. Specify whether or not the IdP will sign the SAML assertion.
  9. Enter the identity provider assertion signing certificate alias name.
  10. Enter the directory where you store your custom TLS certificates to enable SAML authentication in the domain.
    Specify the directory only, not the full path to the file.
  11. Specify the location and passwords of the keystore and truststore files.
    The following table describes the location and password of the truststore and keystore files:
    Property
    Description
    Truststore Directory
    The directory containing the custom truststore file. Specify the directory only, not the full path to the file.
    Truststore Password
    The password for the custom truststore file.
    Keystore Directory
    The directory containing the custom keystore file.
    Keystore Password
    The password for the custom keystore file.
  12. To specify the Authentication Context Comparison, specify the strength comparison of the authentication mechanism used by the user with the IdP server.
    Supported values are MINIMUM, MAXIMUM, BETTER, or EXACT option. Default is MINIMUM.
  13. To set the Authentication Context Class, specify the expected mechanism of first time authentication of the user with the IdP server.
    Supported values are PASSWORD or PASSWORDPROTECTEDTRANSPORT. Default is PASSWORD.
  14. Specify whether or not you want to enable the webapp to sign the SAML authentication request.
    Default is disabled.
  15. Specify the alias name of the private key that was imported to the node SAML keystore using which the SAML request should be signed.
  16. Specify the password to access the private key used for signing the SAML request.
  17. Specify the algorithm that the web application uses to sign the SAML request.
    Use one of the following values:
    RSA_SHA256, DSA_SHA1, DSA_SHA256, RSA_SHA1, RSA_SHA224, RSA_SHA384, RSA_SHA512, ECDSA_SHA1, ECDSA_SHA224, ECDSA_SHA256, ECDSA_SHA384, ECDSA_SHA512, RIPEMD160, or RSA_MD5
    .
  18. Specify whether or not you want IdP to sign the SAML response.
    Choose this to enable the webapp to receive the signed SAML response. Default is disabled.
  19. Specify whether or not IdP will encrypt the SAML assertion.
    Choose this to enable the webapp to receive an encrypted SAML assertion. Default is enabled.
  20. Specify the alias name of the private key present in the gateway node SAML truststore that Informatica uses to decrypt the SAML assertion.
  21. Provide the password to access the private key to use when decrypting the assertion encryption key.
  22. Press
    Enter
    .
    The
    Domain Security - Secure Connection
    section appears.

0 COMMENTS

We’d like to hear from you!