Table of Contents

Search

  1. Preface
  2. Introducing Administrator
  3. Organizations
  4. Licenses
  5. Ecosystem single sign-on
  6. SAML single sign-on
  7. Source control and service upgrade settings
  8. Users and user groups
  9. User roles
  10. Permissions
  11. Runtime environments
  12. Serverless runtime environments
  13. Secure Agent services
  14. Secure Agent installation
  15. Schedules
  16. Bundle management
  17. Event monitoring
  18. File transfer
  19. Troubleshooting

Administrator

Administrator

Secure Agent groups

Secure Agent groups

Use a Secure Agent group as the runtime environment when you need to access data on-premises or when you want to access data in a cloud computing services environment without using the Hosted Agent. When you select a Secure Agent group as the runtime environment for a connection or task, a Secure Agent within the group runs the tasks.
Create Secure Agent groups to accomplish the following goals:
Prevent the activities of one department from affecting another department.
To prevent the activities of one department from impacting a different department, create separate Secure Agent groups for each department. For example, users in the sales department run 10 times as many tasks as users in the finance department, but the finance tasks are more time critical. To prevent the sales tasks from impacting the finance tasks, create separate Secure Agent groups for each department. Then assign the sales tasks to one runtime environment and the finance tasks to the other runtime environment.
Separate tasks by environment.
You can create different Secure Agent groups for test and production environments. When you configure a connection, you can associate it with the test or production database by choosing the appropriate Secure Agent group as the runtime environment.
When you create a Secure Agent group, all users in the organization can select the Secure Agent group as the runtime environment.
You can add and remove Secure Agents from a group. Based on your license, you can also perform the following actions:
  • If you have the Secure Agent Cluster license, you can add multiple agents to a Secure Agent group.
  • If you have the Organization Hierarchy license, you can share a Secure Agent group with your sub-organizations.
If you use the runtime environment to run a
mapping
task that is based on an
elastic mapping
, the Secure Agent group must have only one Secure Agent.
If you need to access output files on the Secure Agent machine, you can view the
All Jobs
page in
Monitor
or the
My Jobs
page in
Data Integration
to determine where a task ran.


Updated August 03, 2020