Table of Contents

Search

  1. Preface
  2. Introducing Administrator
  3. Organizations
  4. Licenses
  5. Ecosystem single sign-on
  6. SAML single sign-on
  7. Metering
  8. Source control and service upgrade settings
  9. Users and user groups
  10. User roles
  11. Permissions
  12. Runtime environments
  13. Serverless runtime environments
  14. Secure Agent services
  15. Secure Agent installation
  16. Schedules
  17. Bundle management
  18. Event monitoring
  19. File transfer
  20. Troubleshooting

Administrator

Administrator

Ecosystem single sign-on

Ecosystem single sign-on

Informatica Intelligent Cloud Services
enables single sign-on capability for Microsoft Azure users. This allows Microsoft Azure users to sign in to
Informatica Intelligent Cloud Services
without having to enter their login information again.
When you create your organization through Microsoft Azure, you can configure some single sign-on properties for Microsoft Azure users on the
Ecosystem SSO
page.
The ecosystem single sign-on properties that you configure for Microsoft Azure are different than the SAML single sign-on properties that you configure to enable single-sign on from a third-party identity provider. To configure SAML single sign-on for your organization, see SAML single sign-on.
The following image shows the
Ecosystem SSO
page:
The Ecosystem SSO page contains one section, "Azure SSO Settings" which contains two properties, "Assign users default role" and "Disable auto provisioning of users." In this image, the Admin role is selected in the "Assign users default role" list, and the "Disable auto provisioning of users" option is not enabled.
You can configure the following properties for Microsoft Azure users:
Assign users default role
When a Microsoft Azure user signs in to your organization for the first time,
Informatica Intelligent Cloud Services
adds the user to your organization and assigns the user a default role. By default,
Informatica Intelligent Cloud Services
assigns the user the Admin role.
You can change the default role to a different role such as the Designer role. To change the default user role, select a different role in the
Assign users default role
list.
If you want Microsoft Azure users to be able to download, install, and register a Secure Agent, assign them the Admin or Designer role. You can also assign users a custom role that has privileges to create, read, and update Secure Agents.
Disable auto-provisioning of users
By default, the first time a Microsoft Azure user signs in to
Data Accelerator for Azure
,
Informatica Intelligent Cloud Services
adds the user to your organization. This process is called auto-provisioning.
You can enable or disable the auto-provisioning of Microsoft Azure users. To do this, enable or disable the
Disable auto provisioning of users
option.
If you disable auto-provisioning, you must create each user on the
Users
page. If you want the user to be able to use single sign-on from Microsoft Azure, you must also set the
Authentication
field on the user details page to
Azure SSO
.


Updated October 29, 2020