Table of Contents

Search

  1. Preface
  2. Transformations
  3. Source transformation
  4. Target transformation
  5. Access Policy transformation
  6. Aggregator transformation
  7. B2B transformation
  8. Chunking transformation
  9. Cleanse transformation
  10. Data Masking transformation
  11. Data Services transformation
  12. Deduplicate transformation
  13. Expression transformation
  14. Filter transformation
  15. Hierarchy Builder transformation
  16. Hierarchy Parser transformation
  17. Hierarchy Processor transformation
  18. Input transformation
  19. Java transformation
  20. Java transformation API reference
  21. Joiner transformation
  22. Labeler transformation
  23. Lookup transformation
  24. Machine Learning transformation
  25. Mapplet transformation
  26. Normalizer transformation
  27. Output transformation
  28. Parse transformation
  29. Python transformation
  30. Rank transformation
  31. Router transformation
  32. Rule Specification transformation
  33. Sequence transformation
  34. Sorter transformation
  35. SQL transformation
  36. Structure Parser transformation
  37. Transaction Control transformation
  38. Union transformation
  39. Vector Embedding transformation
  40. Velocity transformation
  41. Verifier transformation
  42. Web Services transformation

Transformations

Transformations

Address Reference Data

Address Reference Data

To verify the quality of the addresses in your source data, the Verifier transformation compares the addresses to the data in one or more reference data files.
When you run a mapping with a Verifier transformation, the Secure Agent evaluates the input data and downloads the reference data files that you need. Each reference data file is specific to a single country. The Secure Agent downloads one or more files for each county that the input address data specifies.
You do not need to take any action to download the files. If the current reference data files already exist on the system, the Secure Agent does not download them again.
Each reference data file requires a license. You buy the license from Informatica. You enter the license key information as a system configuration property on the Secure Agent that runs the mapping. Find the Secure Agent properties in the Administrator service.
For more information on reference data properties, consult the
Verifier Guide
in the Data Quality online help.

0 COMMENTS

We’d like to hear from you!