Table of Contents

Search

  1. Preface
  2. Transformations
  3. Source transformation
  4. Target transformation
  5. Access Policy transformation
  6. Aggregator transformation
  7. B2B transformation
  8. Cleanse transformation
  9. Data Masking transformation
  10. Data Services transformation
  11. Deduplicate transformation
  12. Expression transformation
  13. Filter transformation
  14. Hierarchy Builder transformation
  15. Hierarchy Parser transformation
  16. Hierarchy Processor transformation
  17. Input transformation
  18. Java transformation
  19. Java transformation API reference
  20. Joiner transformation
  21. Labeler transformation
  22. Lookup transformation
  23. Machine Learning transformation
  24. Mapplet transformation
  25. Normalizer transformation
  26. Output transformation
  27. Parse transformation
  28. Python transformation
  29. Rank transformation
  30. Router transformation
  31. Rule Specification transformation
  32. Sequence transformation
  33. Sorter transformation
  34. SQL transformation
  35. Structure Parser transformation
  36. Transaction Control transformation
  37. Union transformation
  38. Velocity transformation
  39. Verifier transformation
  40. Web Services transformation

Transformations

Transformations

Address Reference Data

Address Reference Data

To verify the quality of the addresses in your source data, the Verifier transformation compares the addresses to the data in one or more reference data files.
When you run a mapping with a Verifier transformation, the Secure Agent evaluates the input data and downloads the reference data files that you need. Each reference data file is specific to a single country. The Secure Agent downloads one or more files for each county that the input address data specifies.
You do not need to take any action to download the files. If the current reference data files already exist on the system, the Secure Agent does not download them again.
Each reference data file requires a license. You buy the license from Informatica. You enter the license key information as a system configuration property on the Secure Agent that runs the mapping. Find the Secure Agent properties in the Administrator service.
For more information on reference data properties, consult the
Verifier Guide
in the Data Quality online help.

0 COMMENTS

We’d like to hear from you!