Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Security Guide

Security Guide

Authentication

Authentication

The Service Manager authenticates the services that run in the domain and the users who log in to the
CDI-PC Client
tools.
You can configure the
CDI-PC domain
to use the following types of authentication:
Native Authentication
Native authentication is a mode of authentication available only for user accounts in the
CDI-PC domain
. When the
CDI-PC domain
uses native authentication, the Service Manager stores user credentials and privileges in the domain configuration repository and performs all user authentication within the
CDI-PC domain
.
If the
CDI-PC domain
uses native authentication, by default, the domain has a native security domain and all user accounts belong to the native security domain.
Informatica uses user name and passwords to authenticate users and services in the
CDI-PC domain
.
Lightweight Directory Access Protocol (LDAP) Authentication
LDAP is a software protocol for accessing users and resources on a network. If the
CDI-PC domain
uses LDAP authentication, the user accounts and credentials are stored in the LDAP directory service. The user privileges and permissions are stored in the domain configuration repository. You must periodically synchronize the user accounts in the domain configuration repository with the user accounts in the LDAP directory service.
Informatica uses user name and passwords to authenticate Informatica users and services in the
CDI-PC domain
.
Kerberos Authentication
Kerberos is a network authentication protocol which uses tickets to authenticate users and services in a network. When the
CDI-PC domain
uses Kerberos authentication, the user accounts and credentials are stored in the Kerberos principal database, which can be an LDAP directory service. The user privileges and permissions are stored in the domain configuration repository. You must periodically synchronize the user accounts in the domain configuration repository with the user accounts in the Kerberos principal database.
Informatica uses the Kerberos tickets to authenticate Informatica users and services in the
CDI-PC domain
.
SAML-based Single Sign-on
Security Assertion Markup Language (SAML) is an XML-based data format for exchanging authentication and authorization information between a service provider and an identity provider. You can configure SAML-based single sign-on for the Administrator tool, the Analyst tool, and the Monitoring tool web applications.
In
CDI-PC domain
, the Informatica web application is the service provider, and Microsoft Active Directory Federation Services (AD FS) is the identity provider. The accounts and credentials for Informatica web application users are stored in Microsoft Active Directory. You import accounts from Active Directory into a security domain within the
CDI-PC domain
. You must periodically synchronize the user accounts in the security domain with the user accounts in the Active Directory directory service.
You cannot enable SAML-based single sign-on in
CDI-PC domain
configured to use Kerberos authentication.

0 COMMENTS

We’d like to hear from you!