DDM 991 InstallationAndUpgradeGuide en
DDM 991 InstallationAndUpgradeGuide en
9.9.1
This software and documentation contain proprietary information of Informatica LLC and are provided under a license agreement containing restrictions on use and
disclosure and are also protected by copyright law. Reverse engineering of the software is prohibited. No part of this document may be reproduced or transmitted in any
form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC. This Software may be protected by U.S. and/or
international Patents and other Patents Pending.
Use, duplication, or disclosure of the Software by the U.S. Government is subject to the restrictions set forth in the applicable software license agreement and as
provided in DFARS 227.7202-1(a) and 227.7702-3(a) (1995), DFARS 252.227-7013©(1)(ii) (OCT 1988), FAR 12.212(a) (1995), FAR 52.227-19, or FAR 52.227-14 (ALT III),
as applicable.
The information in this product or documentation is subject to change without notice. If you find any problems in this product or documentation, please report them to
us in writing.
Informatica, Informatica Platform, Informatica Data Services, PowerCenter, PowerCenterRT, PowerCenter Connect, PowerCenter Data Analyzer, PowerExchange,
PowerMart, Metadata Manager, Informatica Data Quality, Informatica Data Explorer, Informatica B2B Data Transformation, Informatica B2B Data Exchange Informatica
On Demand, Informatica Identity Resolution, Informatica Application Information Lifecycle Management, Informatica Complex Event Processing, Ultra Messaging,
Informatica Master Data Management, and Live Data Map are trademarks or registered trademarks of Informatica LLC in the United States and in jurisdictions
throughout the world. All other company and product names may be trade names or trademarks of their respective owners.
Portions of this software and/or documentation are subject to copyright held by third parties, including without limitation: Copyright DataDirect Technologies. All rights
reserved. Copyright © Sun Microsystems. All rights reserved. Copyright © RSA Security Inc. All Rights Reserved. Copyright © Ordinal Technology Corp. All rights
reserved. Copyright © Aandacht c.v. All rights reserved. Copyright Genivia, Inc. All rights reserved. Copyright Isomorphic Software. All rights reserved. Copyright © Meta
Integration Technology, Inc. All rights reserved. Copyright © Intalio. All rights reserved. Copyright © Oracle. All rights reserved. Copyright © Adobe Systems Incorporated.
All rights reserved. Copyright © DataArt, Inc. All rights reserved. Copyright © ComponentSource. All rights reserved. Copyright © Microsoft Corporation. All rights
reserved. Copyright © Rogue Wave Software, Inc. All rights reserved. Copyright © Teradata Corporation. All rights reserved. Copyright © Yahoo! Inc. All rights reserved.
Copyright © Glyph & Cog, LLC. All rights reserved. Copyright © Thinkmap, Inc. All rights reserved. Copyright © Clearpace Software Limited. All rights reserved. Copyright
© Information Builders, Inc. All rights reserved. Copyright © OSS Nokalva, Inc. All rights reserved. Copyright Edifecs, Inc. All rights reserved. Copyright Cleo
Communications, Inc. All rights reserved. Copyright © International Organization for Standardization 1986. All rights reserved. Copyright © ej-technologies GmbH. All
rights reserved. Copyright © Jaspersoft Corporation. All rights reserved. Copyright © International Business Machines Corporation. All rights reserved. Copyright ©
yWorks GmbH. All rights reserved. Copyright © Lucent Technologies. All rights reserved. Copyright © University of Toronto. All rights reserved. Copyright © Daniel
Veillard. All rights reserved. Copyright © Unicode, Inc. Copyright IBM Corp. All rights reserved. Copyright © MicroQuill Software Publishing, Inc. All rights reserved.
Copyright © PassMark Software Pty Ltd. All rights reserved. Copyright © LogiXML, Inc. All rights reserved. Copyright © 2003-2010 Lorenzi Davide, All rights reserved.
Copyright © Red Hat, Inc. All rights reserved. Copyright © The Board of Trustees of the Leland Stanford Junior University. All rights reserved. Copyright © EMC
Corporation. All rights reserved. Copyright © Flexera Software. All rights reserved. Copyright © Jinfonet Software. All rights reserved. Copyright © Apple Inc. All rights
reserved. Copyright © Telerik Inc. All rights reserved. Copyright © BEA Systems. All rights reserved. Copyright © PDFlib GmbH. All rights reserved. Copyright ©
Orientation in Objects GmbH. All rights reserved. Copyright © Tanuki Software, Ltd. All rights reserved. Copyright © Ricebridge. All rights reserved. Copyright © Sencha,
Inc. All rights reserved. Copyright © Scalable Systems, Inc. All rights reserved. Copyright © jQWidgets. All rights reserved. Copyright © Tableau Software, Inc. All rights
reserved. Copyright© MaxMind, Inc. All Rights Reserved. Copyright © TMate Software s.r.o. All rights reserved. Copyright © MapR Technologies Inc. All rights reserved.
Copyright © Amazon Corporate LLC. All rights reserved. Copyright © Highsoft. All rights reserved. Copyright © Python Software Foundation. All rights reserved.
Copyright © BeOpen.com. All rights reserved. Copyright © CNRI. All rights reserved.
This product includes software developed by the Apache Software Foundation (http://www.apache.org/), and/or other software which is licensed under various
versions of the Apache License (the "License"). You may obtain a copy of these Licenses at http://www.apache.org/licenses/. Unless required by applicable law or
agreed to in writing, software distributed under these Licenses is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
or implied. See the Licenses for the specific language governing permissions and limitations under the Licenses.
This product includes software which was developed by Mozilla (http://www.mozilla.org/), software copyright The JBoss Group, LLC, all rights reserved; software
copyright © 1999-2006 by Bruno Lowagie and Paulo Soares and other software which is licensed under various versions of the GNU Lesser General Public License
Agreement, which may be found at http:// www.gnu.org/licenses/lgpl.html. The materials are provided free of charge by Informatica, "as-is", without warranty of any
kind, either express or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose.
The product includes ACE(TM) and TAO(TM) software copyrighted by Douglas C. Schmidt and his research group at Washington University, University of California,
Irvine, and Vanderbilt University, Copyright (©) 1993-2006, all rights reserved.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (copyright The OpenSSL Project. All Rights Reserved) and
redistribution of this software is subject to terms available at http://www.openssl.org and http://www.openssl.org/source/license.html.
This product includes Curl software which is Copyright 1996-2013, Daniel Stenberg, <[email protected]>. All Rights Reserved. Permissions and limitations regarding this
software are subject to terms available at http://curl.haxx.se/docs/copyright.html. Permission to use, copy, modify, and distribute this software for any purpose with or
without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
The product includes software copyright 2001-2005 (©) MetaStuff, Ltd. All Rights Reserved. Permissions and limitations regarding this software are subject to terms
available at http://www.dom4j.org/ license.html.
The product includes software copyright © 2004-2007, The Dojo Foundation. All Rights Reserved. Permissions and limitations regarding this software are subject to
terms available at http://dojotoolkit.org/license.
This product includes ICU software which is copyright International Business Machines Corporation and others. All rights reserved. Permissions and limitations
regarding this software are subject to terms available at http://source.icu-project.org/repos/icu/icu/trunk/license.html.
This product includes software copyright © 1996-2006 Per Bothner. All rights reserved. Your right to use such materials is set forth in the license which may be found at
http:// www.gnu.org/software/ kawa/Software-License.html.
This product includes OSSP UUID software which is Copyright © 2002 Ralf S. Engelschall, Copyright © 2002 The OSSP Project Copyright © 2002 Cable & Wireless
Deutschland. Permissions and limitations regarding this software are subject to terms available at http://www.opensource.org/licenses/mit-license.php.
This product includes software developed by Boost (http://www.boost.org/) or under the Boost software license. Permissions and limitations regarding this software
are subject to terms available at http:/ /www.boost.org/LICENSE_1_0.txt.
This product includes software copyright © 1997-2007 University of Cambridge. Permissions and limitations regarding this software are subject to terms available at
http:// www.pcre.org/license.txt.
This product includes software copyright © 2007 The Eclipse Foundation. All Rights Reserved. Permissions and limitations regarding this software are subject to terms
available at http:// www.eclipse.org/org/documents/epl-v10.php and at http://www.eclipse.org/org/documents/edl-v10.php.
This product includes software licensed under the terms at http://www.tcl.tk/software/tcltk/license.html, http://www.bosrup.com/web/overlib/?License, http://
www.stlport.org/doc/ license.html, http://asm.ow2.org/license.html, http://www.cryptix.org/LICENSE.TXT, http://hsqldb.org/web/hsqlLicense.html, http://
httpunit.sourceforge.net/doc/ license.html, http://jung.sourceforge.net/license.txt , http://www.gzip.org/zlib/zlib_license.html, http://www.openldap.org/software/
release/license.html, http://www.libssh2.org, http://slf4j.org/license.html, http://www.sente.ch/software/OpenSourceLicense.html, http://fusesource.com/downloads/
license-agreements/fuse-message-broker-v-5-3- license-agreement; http://antlr.org/license.html; http://aopalliance.sourceforge.net/; http://www.bouncycastle.org/
licence.html; http://www.jgraph.com/jgraphdownload.html; http://www.jcraft.com/jsch/LICENSE.txt; http://jotm.objectweb.org/bsd_license.html; . http://www.w3.org/
Consortium/Legal/2002/copyright-software-20021231; http://www.slf4j.org/license.html; http://nanoxml.sourceforge.net/orig/copyright.html; http://www.json.org/
license.html; http://forge.ow2.org/projects/javaservice/, http://www.postgresql.org/about/licence.html, http://www.sqlite.org/copyright.html, http://www.tcl.tk/
software/tcltk/license.html, http://www.jaxen.org/faq.html, http://www.jdom.org/docs/faq.html, http://www.slf4j.org/license.html; http://www.iodbc.org/dataspace/
iodbc/wiki/iODBC/License; http://www.keplerproject.org/md5/license.html; http://www.toedter.com/en/jcalendar/license.html; http://www.edankert.com/bounce/
index.html; http://www.net-snmp.org/about/license.html; http://www.openmdx.org/#FAQ; http://www.php.net/license/3_01.txt; http://srp.stanford.edu/license.txt;
http://www.schneier.com/blowfish.html; http://www.jmock.org/license.html; http://xsom.java.net; http://benalman.com/about/license/; https://github.com/CreateJS/
EaselJS/blob/master/src/easeljs/display/Bitmap.js; http://www.h2database.com/html/license.html#summary; http://jsoncpp.sourceforge.net/LICENSE; http://
jdbc.postgresql.org/license.html; http://protobuf.googlecode.com/svn/trunk/src/google/protobuf/descriptor.proto; https://github.com/rantav/hector/blob/master/
LICENSE; http://web.mit.edu/Kerberos/krb5-current/doc/mitK5license.html; http://jibx.sourceforge.net/jibx-license.html; https://github.com/lyokato/libgeohash/blob/
master/LICENSE; https://github.com/hjiang/jsonxx/blob/master/LICENSE; https://code.google.com/p/lz4/; https://github.com/jedisct1/libsodium/blob/master/
LICENSE; http://one-jar.sourceforge.net/index.php?page=documents&file=license; https://github.com/EsotericSoftware/kryo/blob/master/license.txt; http://www.scala-
lang.org/license.html; https://github.com/tinkerpop/blueprints/blob/master/LICENSE.txt; http://gee.cs.oswego.edu/dl/classes/EDU/oswego/cs/dl/util/concurrent/
intro.html; https://aws.amazon.com/asl/; https://github.com/twbs/bootstrap/blob/master/LICENSE; https://sourceforge.net/p/xmlunit/code/HEAD/tree/trunk/
LICENSE.txt; https://github.com/documentcloud/underscore-contrib/blob/master/LICENSE, and https://github.com/apache/hbase/blob/master/LICENSE.txt.
This product includes software licensed under the Academic Free License (http://www.opensource.org/licenses/afl-3.0.php), the Common Development and
Distribution License (http://www.opensource.org/licenses/cddl1.php) the Common Public License (http://www.opensource.org/licenses/cpl1.0.php), the Sun Binary
Code License Agreement Supplemental License Terms, the BSD License (http:// www.opensource.org/licenses/bsd-license.php), the new BSD License (http://
opensource.org/licenses/BSD-3-Clause), the MIT License (http://www.opensource.org/licenses/mit-license.php), the Artistic License (http://www.opensource.org/
licenses/artistic-license-1.0) and the Initial Developer’s Public License Version 1.0 (http://www.firebirdsql.org/en/initial-developer-s-public-license-version-1-0/).
This product includes software copyright © 2003-2006 Joe WaInes, 2006-2007 XStream Committers. All rights reserved. Permissions and limitations regarding this
software are subject to terms available at http://xstream.codehaus.org/license.html. This product includes software developed by the Indiana University Extreme! Lab.
For further information please visit http://www.extreme.indiana.edu/.
This product includes software Copyright (c) 2013 Frank Balluffi and Markus Moeller. All rights reserved. Permissions and limitations regarding this software are subject
to terms of the MIT license.
DISCLAIMER: Informatica LLC provides this documentation "as is" without warranty of any kind, either express or implied, including, but not limited to, the implied
warranties of noninfringement, merchantability, or use for a particular purpose. Informatica LLC does not warrant that this software or documentation is error free. The
information provided in this software or documentation may include technical inaccuracies or typographical errors. The information in this software and documentation
is subject to change at any time without notice.
NOTICES
This Informatica product (the "Software") includes certain drivers (the "DataDirect Drivers") from DataDirect Technologies, an operating company of Progress Software
Corporation ("DataDirect") which are subject to the following terms and conditions:
1. THE DATADIRECT DRIVERS ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
2. IN NO EVENT WILL DATADIRECT OR ITS THIRD PARTY SUPPLIERS BE LIABLE TO THE END-USER CUSTOMER FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, CONSEQUENTIAL OR OTHER DAMAGES ARISING OUT OF THE USE OF THE ODBC DRIVERS, WHETHER OR NOT INFORMED OF THE POSSIBILITIES
OF DAMAGES IN ADVANCE. THESE LIMITATIONS APPLY TO ALL CAUSES OF ACTION, INCLUDING, WITHOUT LIMITATION, BREACH OF CONTRACT, BREACH
OF WARRANTY, NEGLIGENCE, STRICT LIABILITY, MISREPRESENTATION AND OTHER TORTS.
Revision: 1
Publication Date: 2019-06-27
Table of Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Informatica Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Informatica Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Informatica Knowledge Base. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Informatica Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Informatica Product Availability Matrices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Informatica Velocity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Informatica Marketplace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Informatica Global Customer Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4 Table of Contents
Back Up the Configuration Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Back Up the Lib/ext Directory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Update the License Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Upgrade the Server and Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Upgrade the Management Console to the Server and Management Console. . . . . . . . . . . . . . . . 23
Upgrade the Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Upgrade in Silent Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Chapter 6: Uninstallation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Uninstallation Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Uninstalling in Graphical Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Uninstalling in Console Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Table of Contents 5
Preface
The Informatica Dynamic Data Masking Installation Guide is written for system administrators who are
responsible for the installation or upgrade of Dynamic Data Masking. This guide assumes you have
knowledge of your operating systems, relational database concepts, and the database engines in your
environment.
Informatica Resources
Informatica provides you with a range of product resources through the Informatica Network and other online
portals. Use the resources to get the most from your Informatica products and solutions and to learn from
other Informatica users and subject matter experts.
Informatica Network
The Informatica Network is the gateway to many resources, including the Informatica Knowledge Base and
Informatica Global Customer Support. To enter the Informatica Network, visit
https://network.informatica.com.
To search the Knowledge Base, visit https://search.informatica.com. If you have questions, comments, or
ideas about the Knowledge Base, contact the Informatica Knowledge Base team at
[email protected].
Informatica Documentation
Use the Informatica Documentation Portal to explore an extensive library of documentation for current and
recent product releases. To explore the Documentation Portal, visit https://docs.informatica.com.
6
Informatica maintains documentation for many products on the Informatica Knowledge Base in addition to
the Documentation Portal. If you cannot find documentation for your product or product version on the
Documentation Portal, search the Knowledge Base at https://search.informatica.com.
If you have questions, comments, or ideas about the product documentation, contact the Informatica
Documentation team at [email protected].
Informatica Velocity
Informatica Velocity is a collection of tips and best practices developed by Informatica Professional Services
and based on real-world experiences from hundreds of data management projects. Informatica Velocity
represents the collective knowledge of Informatica consultants who work with organizations around the
world to plan, develop, deploy, and maintain successful data management solutions.
You can find Informatica Velocity resources at http://velocity.informatica.com. If you have questions,
comments, or ideas about Informatica Velocity, contact Informatica Professional Services at
[email protected].
Informatica Marketplace
The Informatica Marketplace is a forum where you can find solutions that extend and enhance your
Informatica implementations. Leverage any of the hundreds of solutions from Informatica developers and
partners on the Marketplace to improve your productivity and speed up time to implementation on your
projects. You can find the Informatica Marketplace at https://marketplace.informatica.com.
To find your local Informatica Global Customer Support telephone number, visit the Informatica website at
the following link:
https://www.informatica.com/services-and-training/customer-success-services/contact-us.html.
To find online support resources on the Informatica Network, visit https://network.informatica.com and
select the eSupport option.
Preface 7
Chapter 1
Installation Overview
This chapter includes the following topic:
• Installation Overview, 8
Installation Overview
Dynamic Data Masking is a data security tool that operates between an application and a database to prevent
unauthorized access to sensitive information. The installation includes the Dynamic Data Masking Server and
a Management Console that you can use to manage and configure the Dynamic Data Masking Server.
Dynamic Data Masking acts as a proxy between the database and the application. You can install the
Dynamic Data Masking Server on the same machine as the database server or on a separate machine.
When you run the Dynamic Data Masking installer, you can select from the following installation options:
To run the Dynamic Data Masking Server and manage the connection and security rules on the same
machine, you can install the Dynamic Data Masking Server and the Management Console together.
Management Console
Installs the Management Console only. You can install the Management Console on a different machine
than where you install the Dynamic Data Masking Server.
To manage the connection and security rules remotely, you can install the Management Console on a
different machine. Connect to the Dynamic Data Masking Server through the port number you specify
when you install the server.
You can install Dynamic Data Masking on a machine with Linux, UNIX, or Windows operating system.
8
Chapter 2
9
Download Software and License Key
Download the installation file and license key to the machine where you plan to install Dynamic Data
Masking. If you install the Management Console only, you do not need a license key.
You can get the software and the license key from an FTP download. If you choose to download the software,
you receive an email that contains the following information:
• Download links. The software is bundled into installation .zip files with a unique link. The download link
takes you to the Informatica Download Manager. After you sign in to the Download Manager, save the
installation .zip file to a directory that is accessible from the machine where you plan to install the
product.
• User ID and password. After you click the download link, sign in to the Download Manager with the user ID
and password.
• License key. The license key is included as an attachment to the email message. Copy the license key file
to the machine where you plan to install the product.
If you do not have a license key, contact Informatica Global Customer Support.
The following table describes the installation files that you use for each platform:
Informatica_DDM_991_Installer_Win Windows
Informatica_DDM_991_Installer_Unix_nojvm - HP-UX
- AIX
- Solaris
The Windows and Linux installers contain the Java SE files required to run Dynamic Data Masking. On UNIX,
you must install Java SE before you begin the installation.
The following table describes the minimum system requirements for Dynamic Data Masking:
Dynamic Data Masking Server and Management Console Dual Core Processor 256 MB 2.6 GB
The Dynamic Data Masking installer, Dynamic Data Masking Server, and Management Console require Java
Development Kit (JDK) SE 8 to run. On UNIX, you must install Java SE 8 before you start the installation so
that the Dynamic Data Masking installer runs properly. The Java directory must be in the system path.
On Windows or Linux, you do not need to install Java. The Dynamic Data Masking installer contains the Java
SE 8 files.
If necessary, change the firewall configuration to open the ports for the Dynamic Data Masking Server.
Port Description
Dynamic Data Port that applications use to connect to the database. The Dynamic Data Masking service listens
Masking service on this port to intercept database requests sent to the database.
listener port If applications connect to multiple databases, you need to verify the availability of multiple port
numbers.
You must specify a listener port number when you create a Dynamic Data Masking service in the
Management Console.
Dynamic Data Masking uses the following default listener port numbers for each database service:
- DDM for Azure SQL: 1435
- DDM for FAS: 8501
- DDM for Hive: 10001
- DDM for HiveHTTP: 10050
- DDM for IBM DB2: 50001
- DDM for Impala: 27051
- DDM for Informix: 9090
- DDM for Informix (DRDA): 9089
- DDM for JDBC: 7000
- DDM for SQL Server: 1434
- DDM for ODBC: 8000
- DDM for Oracle: 1525 and 1526
- DDM for PostgreSQL: 5678
- DDM for Sybase: 5001
- DDM for Teradata: 1025
Dynamic Data Port number that the Management Console uses to connect to the Dynamic Data Masking Server.
Masking Server Default is 8195. You must set the port number during the installation process. After installation,
port you can use the Server Control command setPort to change the port number.
If you do not have a display device installed on the machine where you want to install the product, you can
run the installer by using an X Window server installed on another machine. Use the DISPLAY variable to
redirect output of the X Window to another machine that has X Window and xterm installed.
Shell Command
If you do not know the host name of the machine that has the X Window server that you want to use, ask your
network administrator. You can also use the IP address of the machine. For more information about
redirecting the DISPLAY variable, see the documentation from the UNIX or X Window vendor.
If the X Window server does not support the font that the installer uses, the installer displays the labels on
the buttons incorrectly.
Product Installation
This chapter includes the following topics:
The Dynamic Data Masking installer provides the following installation options:
• Dynamic Data Masking Server and Management Console. Installs the Dynamic Data Masking Server and
the Management Console in one process.
• Management Console. Installs only the Management Console. Before you can use the Management
Console, the Dynamic Data Masking Server must be installed on the same machine or on a different
machine.
You can run the Dynamic Data Masking installer in graphical, console, or silent mode.
If you install on UNIX in graphical mode, you must set up an X Window server.
If you install on Windows, the installer updates the system path to include the following path:
<Dynamic Data Masking installation>\jre\bin
14
Installing in Graphical Mode
1. Log in to the machine with a user account that has administrator privileges.
2. Navigate to the directory where you downloaded the Dynamic Data Masking installation file.
3. Begin the installation on Linux, UNIX, or Windows.
• To begin the installation on Linux or UNIX, run the following command on a shell command line:
DDMInstaller.bin.
• To begin the installation on Windows, run DDMInstaller.exe.
The Welcome page appears.
4. Click Next.
The Installation Mode page appears.
5. Select the option to install the Dynamic Data Masking Server and Console.
6. Click Next.
The Installation Folder page appears.
7. Enter the absolute path for the installation directory and click Next.
The path must conform to the length and character restrictions of the operating system.
The License Key page appears.
8. Enter the path and file name of the Dynamic Data Masking license key and click Next.
The Server Details page appears.
9. Enter the name, port number, and password for the Dynamic Data Masking Server.
The following table describes the properties that you must specify:
Property Description
Server Port Required. Port number that the Management Console uses to connect to the Dynamic Data
Number Masking Server.
Default is 8195. If port number 8195 is not available, the installer uses the next available port
number as default.
Server Required. Password to log in to the Dynamic Data Masking Server through the Management
Password Console.
Property Description
Server Port Required. Port number that the Management Console uses to connect to the Dynamic Data
Number Masking Server.
Default is 8195. If port number 8195 is not available, the installer uses the next available port
number as default.
Server Required. Password to log in to the Dynamic Data Masking Server through the Management
Password Console.
When you type the password, the installer does not display the characters that you enter on the
command line.
1. Log in to the machine with a user account that has administrator privileges.
2. Navigate to the directory where you downloaded the Dynamic Data Masking installation file.
3. Locate the SilentInput.properties file.
4. Create a backup copy of the SilentInput.properties file.
5. Use a text editor to open the SilentInput.properties file and modify the values of the installation
parameters.
The following table describes the Dynamic Data Masking installation parameters that you can modify:
USER_INSTALL_DIR Absolute path for the directory in which to install Dynamic Data Masking. If the folder
contains a current installation, Dynamic Data Masking will upgrade.
Use the default path format. Use two backslashes (\\) before folder names for installation
on Windows. Use a slash (/) for installation on Linux and UNIX.
PA_SERVER_NAME Dynamic Data Masking Server name. To install a Dynamic Data Masking Server with a
different name, modify PA_SERVER_NAME.
PA_PORT_NUMBER Dynamic Data Masking port. To install a Dynamic Data Masking Server that uses a
different port, modify PA_PORT_NUMBER. The number of the port must be valid and not
locked.
6. Save the SilentInput.properties file in the same directory as the silent install script file.
7. Begin the installation on Linux, UNIX, or Windows. Use a shell command line to navigate to the
installation directory and run the following commands:
• On Linux or UNIX, run the following command: silentinstall <administrator password>
• On Windows, run the following command SilentInstall.bat <administrator password>
The administrator password is the Dynamic Data Masking administrator password. If you do not provide
a password, Dynamic Data Masking uses the default password, admin. If you use the default password,
you can change the password after you install.
8. You can view the DDM_Install.log file to get more information about the installation and to view
configuration properties for the installed components. If the installation ends with a warning, check the
DDM_Install.log file for details. The log file might be in the installation directory, on the desktop on
Windows, or in the /home/user directory on Linux and UNIX.
The installation log file contains information about the user interactions, installer actions, and installation
outcome. If the installation fails, use the installation log file to troubleshoot the error.
You can find the installation log file in the following directory:
<Dynamic Data Masking installation>/DDM_Install.log
The Dynamic Data Masking installer uninstalls the previous version of Dynamic Data Masking and installs the
current version. Dynamic Data Masking preserves the configuration and log information from the previous
version.
Dynamic Data Masking Server and Management Console Dynamic Data Masking Server and Management Console
• Verify the prerequisites for the installation and ensure that the machine where you plan to install meets
the installation requirements.
21
• Back up the Dynamic Data Masking configuration files.
• Back up the lib/ext directory.
• Close the Dynamic Data Masking Management Console.
• Stop the Dynamic Data Masking Server.
• Optionally, update the license key.
• Remove the Dynamic Data Masking Windows operating system service.
You can find the Dynamic Data Masking configuration files in the following directory:
<Dynamic Data Masking directory>\cfg
Back up the following files:
• config.properties
• config.cfg
1. Stop the Dynamic Data Masking Server. From a Server Control window, run the following command:
server stop
2. If the Dynamic Data Masking Server runs on Windows, remove the Server. From a Server Control window,
run the following command:
server remove
3. If an expired license key exists in the installation directory, remove the file. You can find the file in the
following location:
<Dynamic Data Masking installation>\cfg\license.lic
4. Save the new license key as license.lic in the following location:
<Dynamic Data Masking installation>\cfg\license.lic
1. Log in to the machine with a user account that has administrator privileges.
2. Close all shells and windows that have the Dynamic Data Masking installation directory current or open.
3. Begin the installation on Linux, UNIX, or Windows.
• Begin installation on Linux or UNIX in a directory outside of the Dynamic Data Masking installation
directory. Run the following command on a shell command line:
<Dynamic Data Masking installation>/DDMInstaller.bin
• On Windows, use a shell command line to navigate to the installation directory and run the following
command
DDMInstaller.exe
The Welcome page appears.
4. Click Next.
The Installation Mode page appears.
5. Select the option to install the Dynamic Data Masking Server and Management Console.
6. Click Next.
The Installation Folder page appears.
7. Enter the absolute path for the directory where you have Dynamic Data Masking installed and click Next.
The Upgrade window appears.
8. Click OK.
The Uninstall Previous Installation window appears.
9. Click OK.
The Pre-Installation Summary page displays the installation details.
10. Verify that the installation details are correct before you continue the installation and then click Install.
When the installation completes, the installer indicates whether the installation is successful.
11. Click Done to close the installer.
You can view the DDM_Install.log file to get more information about the installation and to view
configuration properties for the installed components. If the installation ends with a warning, check the
DDM_Install.log file for details. The log file is in the installation directory.
1. Log in to the machine with a user account that has administrator privileges.
2. Begin the installation on Linux, UNIX, or Windows. Use a shell command line to navigate to the
installation directory and run the following commands:
Property Description
Server Port Required. Port number that the Management Console uses to connect to the Dynamic Data
Number Masking Server.
Default is 8195. If port number 8195 is not available, the installer uses the next available port
number as default.
Server Required. Password to log in to the Dynamic Data Masking Server through the Management
Password Console.
1. Log in to the machine with a user account that has administrator privileges.
2. Begin the installation. Use a shell command line to navigate to the installation directory and run the
following command:
DDMInstaller.exe
The Welcome page appears.
3. Click Next.
The Installation Mode page appears.
4. Select the option to install the Dynamic Data Masking Management Console.
5. Click Next.
The Installation Folder page appears.
6. Enter the absolute path for the directory where you have the Dynamic Data Masking Management
Console installed and click Next.
The Upgrade window appears.
7. Click OK.
The Uninstall Previous Installation window appears.
8. Click OK.
The Pre-Installation Summary page displays the installation details.
9. Verify that the installation details are correct before you continue the installation and then click Install.
When the installation completes, the installer indicates whether the installation is successful.
10. Click Done to close the installer.
You can view the DDM_Install.log file to get more information about the installation and to view
configuration properties for the installed components. If the installation ends with a warning, check the
DDM_Install.log file for details. The log file is in the installation directory.
1. Log in to the machine with a user account that has administrator privileges.
2. Navigate to the directory where you downloaded the Dynamic Data Masking installation file.
3. Locate the SilentInput.properties file.
USER_INSTALL_DIR Absolute path for the directory in which Dynamic Data Masking is installed.
Use the default path format. Use two backslashes (\\) before folder names for installation
on Windows. Use a slash (/) for installation on Linux and UNIX.
PA_LICENSE_FILE Absolute path to a valid license file. If you have not uninstalled Dynamic Data Masking, the
installation ignores this parameter and uses the license file of the previous installation. If
you uninstalled Dynamic Data Masking, the installation uses this parameter.
Use the default path format. Use two backslashes (\\) before folder names for installation
on Windows. Use a slash (/) for installation on Linux and UNIX.
6. Save the SilentInput.properties file in the same directory as the silent install script file.
7. Close all shells and windows that have the Dynamic Data Masking installation directory current or open.
8. Begin the installation on Linux, UNIX, or Windows.
• Begin installation on Linux or UNIX in a directory outside of the Dynamic Data Masking installation
directory. Run the following command on a shell command line:
<Dynamic Data Masking installation>/silentinstall <administrator password>
• To begin installation on Windows, open a command window and run the following command from the
installation directory:
SilentInstall.bat <administrator password>
The administrator password is the Dynamic Data Masking administrator password. If you do not provide
a password, Dynamic Data Masking uses the default password, admin. If you use the default password,
you can chanage the password after you install.
You can view the DDM_Install.log file to get more information about the installation and to view
configuration properties for the installed components. If the installation ends with a warning, check the
DDM_Install.log file for details. The log file might be in the installation directory, on the desktop on
Windows, or in the /home/user directory on Linux and UNIX.
After you install the Dynamic Data Masking Server, complete the following tasks:
• Verify that Java SE 8 is installed on the machine where you installed the Dynamic Data Masking Server.
• On Linux, set the open file resource boundaries.
• Optionally, set up LDAP or Active Directory authentication.
• Optionally, on UNIX, set up the Dynamic Data Masking server to restart when the host machine restarts.
• Optionally, manually upgrade the Dynamic Data Masking for Microsoft SQL Server service from version
9.5.1 or earlier.
Windows or Linux
On Windows, the required Java SE 8 files are installed with Dynamic Data Masking.
UNIX
On UNIX, the Dynamic Data Masking installer does not install the required Java files.
Verify that Java SE 8 is installed on the machine where you installed Dynamic Data Masking. If Java SE 8
is not in the system path, modify the file JAVA_HOME environment variable in the $INSTALL_DIR/
setup_server and $INSTALL_DIR/LogLoader/logloader scripts.
27
Set User Resource Boundaries
On Linux, you must increase the number of open file resources that are available the Dynamic Data Masking
user.
Each Dynamic Data Masking client occupies an open file resource to connect to the Dynamic Data Masking
Server. In addition, each connection from the Dynamic Data Masking Server to the database occupies an
open file resource. Because Dynamic Data Masking requires a large number of resources, you must edit the
limits.conf file to increase the number of open file resources available to the Dynamic Data Masking user.
To check the open file descriptor limit, run the following shell command:
/proc/<Dynamic Data Masking process ID>/limits
Informatica recommends that you set the hard and soft open file descriptor limits to five times the maximum
number of database connections that you create through Dynamic Data Masking. For example, if you create
400 connections through Dynamic Data Masking, you might set the open file descriptor limit to 2000.
1. Open the limits.conf file. You can find the file in the following location:
etc/security/limits.conf
2. In the limits.conf file, edit the Dynamic Data Masking user soft nofile and hard nofile parameters. The
following text shows the limits set to 4000:
<Dynamic Data Masking user> hard nofile 4000
<Dynamic Data Masking user> soft nofile 4000
3. Log out and log back in to the Linux machine.
4. Open a Server Control window and run the following commands:
• server stop
• server start
5. To verify that you set the file descriptor limits correctly, run the following shell command:
/proc/<Dynmaic Data Masking procedure ID>/limits
Set Up Authentication
You can set up LDAP or Active Directory authentication.
To provide security and limit access to the Management Console, use a stronger authentication scheme for
Dynamic Data Masking than the default internal authentication. Log in to the Management Console with the
user name admin and the Dynamic Data Masking Server password, then configure the authentication method
that you want to use for Dynamic Data Masking.
Automatic Restart
On Linux and UNIX, you must set up the Dynamic Data Masking Server to restart when the host machine
restarts. Dynamic Data Masking works in conjunction with the database to process database requests. If you
do not set up automatic restart, no database client application will have access to the database after the host
machine restarts.
If you do not set up automatic restart, you must manually restart the Dynamic Data Masking Server after you
restart the host machine.
On Linux and UNIX, log in as the superuser and create symbolic links to the S99ddmsrv script file in each of
the runlevel directories to ensure that the script file will run at startup. The initialization process differs
depending on the platform. If you are unsure where or how to install the rc.d script file, contact the vendor for
instructions.
For example, on Red Hat Enterprise Linux 6, create symbolic links for the appropriate runlevels with the
following command format:
ln -s <Dynamic Data Masking installation directory>/S99ddmsrv /etc/rc.d/rc<runlevel>.d/
S99ddmsrv
If you have more than one Dynamic Data Masking Server on a machine, you can add each server to the
automatic startup. Create a symbolic link with a unique name that references the S99ddmsrv script file for
each Dynamic Data Masking Server.
For example, on Red Hat Enterprise Linux 6, you might run the following commands:
• ln -s /home/rhel6/Informatica/DDM1/S99ddmsrv /etc/rc.d/rc3.d/S99ddmsrv1
• ln -s /home/rhel6/Informatica/DDM2/S99ddmsrv /etc/rc.d/rc3.d/S99ddmsrv2
• ln -s /home/rhel6/Informatica/DDM1/S99ddmsrv /etc/rc.d/rc5.d/S99ddmsrv1
• ln -s /home/rhel6/Informatica/DDM2/S99ddmsrv /etc/rc.d/rc5.d/S99ddmsrv2
Before you uninstall Dynamic Data Masking, you must remove the symbolic links that you created in the
runlevel directories.
Note: On Windows, the Dynamic Data Masking installer configures the Dynamic Data Masking Server to
restart when the host machine restarts.
Perform the following steps for each Microsoft SQL Server database defined in the Management Console
tree:
Property Value
Incoming Port Enter the port number from the Microsoft SQL Server database node.
Database Enter the DDM Database Name from the Microsoft SQL Server database node.
Property Value
Rule Set Name Enter the Rule Set Name specified in the default rule set parameter from the Microsoft SQL
Server database node.
1. Export the default rule set and the rule sets associated with the Microsoft for SQL Server databases you
defined in the Microsoft SQL Server Databases section of the database Edit window. In the Management
Console, select a rule set and click Tree > Security Rule Set.
The Rule Editor window appears.
2. Click Action > Export.
The Export window appears.
3. Navigate to the directory where you want to save the rule set and click Export.
4. Click File > Exit to close the Rule Editor.
5. In the Management Console tree, select a domain node and click Tree > Security Rule Set.
The Add Rule Set window appears.
6. Enter a rule set name in the Rule Set Name field and click OK to close the Add Rule Set window.
7. In the Management Console tree, select the MasterRuleSet security rule set and click Tree > Security
Rule Set.
The Rule Editor window appears.
8. Click Action > Append Rule.
The Append Rule window appears.
9. Specify the following properties in the Append Rule window:
Property Value
Matcher Any
Property Value
Text Enter the name of the database. The Text property is case sensitive.
You can log in to the Management Console to connect to a Dynamic Data Masking Server. If Dynamic Data
Masking uses internal authentication, you can log in to the Management Console with the user name admin
and the Dynamic Data Masking Server password. If Dynamic Data Masking is configured with LDAP or Active
Directory authentication, you must log in with a valid user name and password.
Uninstallation
This chapter includes the following topics:
• Uninstallation Overview, 34
• Uninstalling in Graphical Mode, 34
• Uninstalling in Console Mode, 35
Uninstallation Overview
The Dynamic Data Masking installation creates an uninstallation directory that includes an uninstaller.
When you uninstall Dynamic Data Masking, the uninstaller removes the files and folders that were created as
part of the installation. The configuration file and the log files are not removed.
If you created symbolic links in the runlevel directories to configure automatic startup of the Dynamic Data
Masking Server, you must remove the symbolic links before you uninstall Dynamic Data Masking.
By default, if you run the uninstaller without any parameters, the uninstaller detects the mode in which the
product was installed and uses the same mode to uninstall. For example, if you install Dynamic Data Masking
in console mode, the uninstaller runs in console mode even if you do not pass the -i console parameter.
The Dynamic Data Masking Server must be shut down before you uninstall Dynamic Data Masking.
1. Log in to the machine with a user account that has administrator privileges.
2. Shut down the Dynamic Data Masking Server and close the Management Console.
3. Close all shells and windows that have the Dynamic Data Masking installation directory current or open.
4. If you created symbolic links for automatic restart in the rc.d directories on Linux or UNIX, remove the
links.
5. Begin uninstallation on Linux, UNIX, or Windows.
34
• Begin uninstallation on Linux or UNIX in a directory outside of the Dynamic Data Masking installation
directory. Run the following command on a shell command line:
<Dynamic Data Masking installation>/Uninstaller/uninstall.bin -i gui
• To begin uninstallation on Windows, go to the Informatica Dynamic Data Masking folder in the Start
menu and select the option to uninstall the Dynamic Data Masking Server or the Management
Console. Or open a command window, and run the following command from the installation directory:
Uninstaller\uninstall.exe -i gui
The uninstaller requests confirmation to uninstall.
6. Select Yes to proceed with the uninstallation process.
7. Click Next to continue.
The uninstaller deletes the Dynamic Data Masking files and indicates whether the uninstallation
completed successfully. The uninstaller does not remove the configuration file or the log files. You must
delete these files manually.
8. Click Done to close the uninstaller.
1. Log in to the machine with a user account that has administrator privileges.
2. Shut down the Dynamic Data Masking Server and close the Management Console.
3. Close all shells and windows that have the Dynamic Data Masking installation directory current or open.
4. If you created symbolic links for automatic restart in the rc.d directories on Linux or UNIX, remove the
links.
5. Begin uninstallation on Linux, UNIX, or Windows.
• Begin uninstallation on Linux or UNIX in a directory outside of the Dynamic Data Masking installation
directory. Run the following command on a shell command line:
<Dynamic Data Masking installation>/Uninstaller/uninstall.bin -i console
• To begin uninstallation on Windows, open a command window and run the following command from
the installation directory:
Uninstaller\uninstall.exe -i console
The uninstaller requests confirmation to uninstall.
6. Select Yes to proceed with the uninstallation process.
7. Press Enter to continue.
The uninstaller deletes the Dynamic Data Masking files and indicates whether the uninstallation
completed successfully. The uninstaller does not remove the configuration file or the log files. You must
delete these files manually.
8. Type Exit to close the uninstaller.
D license keys
installation 10
Dynamic Data Masking logs
uninstallation DDM_Install.log 19
console mode 35
graphical mode 34
Dynamic Data Masking Server
post-installation steps 27
M
Java requirement 11 Management Console
port 11 post-installation steps 32
prerequisites 10 Java requirement 11
troubleshooting 20 prerequisites 10
E P
environment variables port
DISPLAY 12 Dynamic Data Masking Server 11
post-installation steps
Dynamic Data Masking Server 27
G Management Console 32
prerequisites
graphical mode Dynamic Data Masking Server 10
installation requirements 12 Management Console 10
I S
installation software
license keys for 10 installation 10
logs 19
pre-installation tasks 9
software 10
troubleshooting 19
T
installation requirements troubleshooting
X Window Server 12 Dynamic Data Masking Server 20
installer installation 19
files 10 logs 19
J U
Java requirement uninstallation
Dynamic Data Masking Server 11 Dynamic Data Masking 34, 35
Management Console 11
X
L X Window Server
license key installation requirements 12
updating 22
36