Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Introduction to Informatica Security
  3. User Authentication
  4. LDAP Authentication
  5. Kerberos authentication
  6. SAML Authentication for Informatica Web Applications
  7. Domain Security
  8. Security Management in Informatica Administrator
  9. Users and Groups
  10. Privileges and Roles
  11. Permissions
  12. Audit Reports
  13. Appendix A: Command Line Privileges and Permissions
  14. Appendix B: Custom Roles

Security Guide

Security Guide

Execute Run-time Objects Privilege

Execute Run-time Objects Privilege

Users assigned the Execute Run-time Objects privilege can start, cold start, and recover tasks and workflows.
The Execute Run-time Objects privilege includes the Monitor Run-time Objects privilege.
The following table lists the required permissions and the actions that users can perform with the Execute Run-time Objects privilege:
Permission
Description
Read and Execute on folder
User is able to assign a
CDI-PC Integration Service
to a workflow using the Service menu or the Navigator.
Read, Write, and Execute on folder
Read and Execute on connection object
User is able to debug a mapping by creating a debug session instance or by using an existing reusable session. Users must also have the Create, Edit, and Delete Run-time Objects privilege.
When the
CDI-PC Integration Service
runs in safe mode, users must have the Administrator role for the associated
CDI-PC Repository Service
.
Read and Execute on folder
Read and Execute on connection object
User is able to debug a mapping by using an existing non-reusable session.
When the
CDI-PC Integration Service
runs in safe mode, users must have the Administrator role for the associated
CDI-PC Repository Service
.
Read and Execute on folder
Read and Execute on connection object
User is able to perform the following actions:
  • Start, cold start, and restart tasks and workflows.
  • Recover tasks and workflows started by their own user account.
If the
CDI-PC Integration Service
uses operating system profiles, users must also have permission on the operating system profile.
When the
CDI-PC Integration Service
runs in safe mode, users must have the Administrator role for the associated
CDI-PC Repository Service
.

0 COMMENTS

We’d like to hear from you!