Informatica Admin Guide(Version 10.2.1)
Informatica Admin Guide(Version 10.2.1)
10.2.1
Informatica Administrator
Reference Guide for
Enterprise Data Catalog
Informatica Informatica Administrator Reference Guide for Enterprise Data Catalog
10.2.1
May 2018
© Copyright Informatica LLC 2015, 2018
This software and documentation are provided only under a separate license agreement containing restrictions on use and disclosure. No part of this document may be
reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC.
Informatica and the Informatica logo are trademarks or registered trademarks of Informatica LLC in the United States and many jurisdictions throughout the world. A
current list of Informatica trademarks is available on the web at https://www.informatica.com/trademarks.html. Other company and product names may be trade
names or trademarks of their respective owners.
U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial
computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such,
the use, duplication, disclosure, modification, and adaptation is subject to the restrictions and license terms set forth in the applicable Government contract, and, to the
extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License.
Portions of this software and/or documentation are subject to copyright held by third parties, including without limitation: Copyright DataDirect Technologies. All rights
reserved. Copyright © Sun Microsystems. All rights reserved. Copyright © RSA Security Inc. All Rights Reserved. Copyright © Ordinal Technology Corp. All rights
reserved. Copyright © Aandacht c.v. All rights reserved. Copyright Genivia, Inc. All rights reserved. Copyright Isomorphic Software. All rights reserved. Copyright © Meta
Integration Technology, Inc. All rights reserved. Copyright © Intalio. All rights reserved. Copyright © Oracle. All rights reserved. Copyright © Adobe Systems Incorporated.
All rights reserved. Copyright © DataArt, Inc. All rights reserved. Copyright © ComponentSource. All rights reserved. Copyright © Microsoft Corporation. All rights
reserved. Copyright © Rogue Wave Software, Inc. All rights reserved. Copyright © Teradata Corporation. All rights reserved. Copyright © Yahoo! Inc. All rights reserved.
Copyright © Glyph & Cog, LLC. All rights reserved. Copyright © Thinkmap, Inc. All rights reserved. Copyright © Clearpace Software Limited. All rights reserved. Copyright
© Information Builders, Inc. All rights reserved. Copyright © OSS Nokalva, Inc. All rights reserved. Copyright Edifecs, Inc. All rights reserved. Copyright Cleo
Communications, Inc. All rights reserved. Copyright © International Organization for Standardization 1986. All rights reserved. Copyright © ej-technologies GmbH. All
rights reserved. Copyright © Jaspersoft Corporation. All rights reserved. Copyright © International Business Machines Corporation. All rights reserved. Copyright ©
yWorks GmbH. All rights reserved. Copyright © Lucent Technologies. All rights reserved. Copyright © University of Toronto. All rights reserved. Copyright © Daniel
Veillard. All rights reserved. Copyright © Unicode, Inc. Copyright IBM Corp. All rights reserved. Copyright © MicroQuill Software Publishing, Inc. All rights reserved.
Copyright © PassMark Software Pty Ltd. All rights reserved. Copyright © LogiXML, Inc. All rights reserved. Copyright © 2003-2010 Lorenzi Davide, All rights reserved.
Copyright © Red Hat, Inc. All rights reserved. Copyright © The Board of Trustees of the Leland Stanford Junior University. All rights reserved. Copyright © EMC
Corporation. All rights reserved. Copyright © Flexera Software. All rights reserved. Copyright © Jinfonet Software. All rights reserved. Copyright © Apple Inc. All rights
reserved. Copyright © Telerik Inc. All rights reserved. Copyright © BEA Systems. All rights reserved. Copyright © PDFlib GmbH. All rights reserved. Copyright ©
Orientation in Objects GmbH. All rights reserved. Copyright © Tanuki Software, Ltd. All rights reserved. Copyright © Ricebridge. All rights reserved. Copyright © Sencha,
Inc. All rights reserved. Copyright © Scalable Systems, Inc. All rights reserved. Copyright © jQWidgets. All rights reserved. Copyright © Tableau Software, Inc. All rights
reserved. Copyright© MaxMind, Inc. All Rights Reserved. Copyright © TMate Software s.r.o. All rights reserved. Copyright © MapR Technologies Inc. All rights reserved.
Copyright © Amazon Corporate LLC. All rights reserved. Copyright © Highsoft. All rights reserved. Copyright © Python Software Foundation. All rights reserved.
Copyright © BeOpen.com. All rights reserved. Copyright © CNRI. All rights reserved.
This product includes software developed by the Apache Software Foundation (http://www.apache.org/), and/or other software which is licensed under various
versions of the Apache License (the "License"). You may obtain a copy of these Licenses at http://www.apache.org/licenses/. Unless required by applicable law or
agreed to in writing, software distributed under these Licenses is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
or implied. See the Licenses for the specific language governing permissions and limitations under the Licenses.
This product includes software which was developed by Mozilla (http://www.mozilla.org/), software copyright The JBoss Group, LLC, all rights reserved; software
copyright © 1999-2006 by Bruno Lowagie and Paulo Soares and other software which is licensed under various versions of the GNU Lesser General Public License
Agreement, which may be found at http:// www.gnu.org/licenses/lgpl.html. The materials are provided free of charge by Informatica, "as-is", without warranty of any
kind, either express or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose.
The product includes ACE(TM) and TAO(TM) software copyrighted by Douglas C. Schmidt and his research group at Washington University, University of California,
Irvine, and Vanderbilt University, Copyright (©) 1993-2006, all rights reserved.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (copyright The OpenSSL Project. All Rights Reserved) and
redistribution of this software is subject to terms available at http://www.openssl.org and http://www.openssl.org/source/license.html.
This product includes Curl software which is Copyright 1996-2013, Daniel Stenberg, <[email protected]>. All Rights Reserved. Permissions and limitations regarding this
software are subject to terms available at http://curl.haxx.se/docs/copyright.html. Permission to use, copy, modify, and distribute this software for any purpose with or
without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
The product includes software copyright 2001-2005 (©) MetaStuff, Ltd. All Rights Reserved. Permissions and limitations regarding this software are subject to terms
available at http://www.dom4j.org/ license.html.
The product includes software copyright © 2004-2007, The Dojo Foundation. All Rights Reserved. Permissions and limitations regarding this software are subject to
terms available at http://dojotoolkit.org/license.
This product includes ICU software which is copyright International Business Machines Corporation and others. All rights reserved. Permissions and limitations
regarding this software are subject to terms available at http://source.icu-project.org/repos/icu/icu/trunk/license.html.
This product includes software copyright © 1996-2006 Per Bothner. All rights reserved. Your right to use such materials is set forth in the license which may be found at
http:// www.gnu.org/software/ kawa/Software-License.html.
This product includes OSSP UUID software which is Copyright © 2002 Ralf S. Engelschall, Copyright © 2002 The OSSP Project Copyright © 2002 Cable & Wireless
Deutschland. Permissions and limitations regarding this software are subject to terms available at http://www.opensource.org/licenses/mit-license.php.
This product includes software developed by Boost (http://www.boost.org/) or under the Boost software license. Permissions and limitations regarding this software
are subject to terms available at http:/ /www.boost.org/LICENSE_1_0.txt.
This product includes software copyright © 1997-2007 University of Cambridge. Permissions and limitations regarding this software are subject to terms available at
http:// www.pcre.org/license.txt.
This product includes software copyright © 2007 The Eclipse Foundation. All Rights Reserved. Permissions and limitations regarding this software are subject to terms
available at http:// www.eclipse.org/org/documents/epl-v10.php and at http://www.eclipse.org/org/documents/edl-v10.php.
This product includes software licensed under the terms at http://www.tcl.tk/software/tcltk/license.html, http://www.bosrup.com/web/overlib/?License, http://
www.stlport.org/doc/ license.html, http://asm.ow2.org/license.html, http://www.cryptix.org/LICENSE.TXT, http://hsqldb.org/web/hsqlLicense.html, http://
httpunit.sourceforge.net/doc/ license.html, http://jung.sourceforge.net/license.txt , http://www.gzip.org/zlib/zlib_license.html, http://www.openldap.org/software/
release/license.html, http://www.libssh2.org, http://slf4j.org/license.html, http://www.sente.ch/software/OpenSourceLicense.html, http://fusesource.com/downloads/
license-agreements/fuse-message-broker-v-5-3- license-agreement; http://antlr.org/license.html; http://aopalliance.sourceforge.net/; http://www.bouncycastle.org/
licence.html; http://www.jgraph.com/jgraphdownload.html; http://www.jcraft.com/jsch/LICENSE.txt; http://jotm.objectweb.org/bsd_license.html; . http://www.w3.org/
Consortium/Legal/2002/copyright-software-20021231; http://www.slf4j.org/license.html; http://nanoxml.sourceforge.net/orig/copyright.html; http://www.json.org/
license.html; http://forge.ow2.org/projects/javaservice/, http://www.postgresql.org/about/licence.html, http://www.sqlite.org/copyright.html, http://www.tcl.tk/
software/tcltk/license.html, http://www.jaxen.org/faq.html, http://www.jdom.org/docs/faq.html, http://www.slf4j.org/license.html; http://www.iodbc.org/dataspace/
iodbc/wiki/iODBC/License; http://www.keplerproject.org/md5/license.html; http://www.toedter.com/en/jcalendar/license.html; http://www.edankert.com/bounce/
index.html; http://www.net-snmp.org/about/license.html; http://www.openmdx.org/#FAQ; http://www.php.net/license/3_01.txt; http://srp.stanford.edu/license.txt;
http://www.schneier.com/blowfish.html; http://www.jmock.org/license.html; http://xsom.java.net; http://benalman.com/about/license/; https://github.com/CreateJS/
EaselJS/blob/master/src/easeljs/display/Bitmap.js; http://www.h2database.com/html/license.html#summary; http://jsoncpp.sourceforge.net/LICENSE; http://
jdbc.postgresql.org/license.html; http://protobuf.googlecode.com/svn/trunk/src/google/protobuf/descriptor.proto; https://github.com/rantav/hector/blob/master/
LICENSE; http://web.mit.edu/Kerberos/krb5-current/doc/mitK5license.html; http://jibx.sourceforge.net/jibx-license.html; https://github.com/lyokato/libgeohash/blob/
master/LICENSE; https://github.com/hjiang/jsonxx/blob/master/LICENSE; https://code.google.com/p/lz4/; https://github.com/jedisct1/libsodium/blob/master/
LICENSE; http://one-jar.sourceforge.net/index.php?page=documents&file=license; https://github.com/EsotericSoftware/kryo/blob/master/license.txt; http://www.scala-
lang.org/license.html; https://github.com/tinkerpop/blueprints/blob/master/LICENSE.txt; http://gee.cs.oswego.edu/dl/classes/EDU/oswego/cs/dl/util/concurrent/
intro.html; https://aws.amazon.com/asl/; https://github.com/twbs/bootstrap/blob/master/LICENSE; https://sourceforge.net/p/xmlunit/code/HEAD/tree/trunk/
LICENSE.txt; https://github.com/documentcloud/underscore-contrib/blob/master/LICENSE, and https://github.com/apache/hbase/blob/master/LICENSE.txt.
This product includes software licensed under the Academic Free License (http://www.opensource.org/licenses/afl-3.0.php), the Common Development and
Distribution License (http://www.opensource.org/licenses/cddl1.php) the Common Public License (http://www.opensource.org/licenses/cpl1.0.php), the Sun Binary
Code License Agreement Supplemental License Terms, the BSD License (http:// www.opensource.org/licenses/bsd-license.php), the new BSD License (http://
opensource.org/licenses/BSD-3-Clause), the MIT License (http://www.opensource.org/licenses/mit-license.php), the Artistic License (http://www.opensource.org/
licenses/artistic-license-1.0) and the Initial Developer’s Public License Version 1.0 (http://www.firebirdsql.org/en/initial-developer-s-public-license-version-1-0/).
This product includes software copyright © 2003-2006 Joe WaInes, 2006-2007 XStream Committers. All rights reserved. Permissions and limitations regarding this
software are subject to terms available at http://xstream.codehaus.org/license.html. This product includes software developed by the Indiana University Extreme! Lab.
For further information please visit http://www.extreme.indiana.edu/.
This product includes software Copyright (c) 2013 Frank Balluffi and Markus Moeller. All rights reserved. Permissions and limitations regarding this software are subject
to terms of the MIT license.
DISCLAIMER: Informatica LLC provides this documentation "as is" without warranty of any kind, either express or implied, including, but not limited to, the implied
warranties of noninfringement, merchantability, or use for a particular purpose. Informatica LLC does not warrant that this software or documentation is error free. The
information provided in this software or documentation may include technical inaccuracies or typographical errors. The information in this software and documentation
is subject to change at any time without notice.
NOTICES
This Informatica product (the "Software") includes certain drivers (the "DataDirect Drivers") from DataDirect Technologies, an operating company of Progress Software
Corporation ("DataDirect") which are subject to the following terms and conditions:
1. THE DATADIRECT DRIVERS ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
2. IN NO EVENT WILL DATADIRECT OR ITS THIRD PARTY SUPPLIERS BE LIABLE TO THE END-USER CUSTOMER FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, CONSEQUENTIAL OR OTHER DAMAGES ARISING OUT OF THE USE OF THE ODBC DRIVERS, WHETHER OR NOT INFORMED OF THE POSSIBILITIES
OF DAMAGES IN ADVANCE. THESE LIMITATIONS APPLY TO ALL CAUSES OF ACTION, INCLUDING, WITHOUT LIMITATION, BREACH OF CONTRACT, BREACH
OF WARRANTY, NEGLIGENCE, STRICT LIABILITY, MISREPRESENTATION AND OTHER TORTS.
The information in this documentation is subject to change without notice. If you find any problems in this documentation, please report them to us in writing at
Informatica LLC 2100 Seaport Blvd. Redwood City, CA 94063.
Informatica products are warranted according to the terms and conditions of the agreements under which they are provided. INFORMATICA PROVIDES THE
INFORMATION IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT.
Chapter 1: Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4 Table of Contents
Chapter 5: Create the Application Services Overview. . . . . . . . . . . . . . . . . . . . . . . . 25
Verify Application Service Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Application Services Dependencies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Create and Configure the Model Repository Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Create the Model Repository Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
After You Create the Model Repository Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Create Other Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Create and Configure the Data Integration Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Create the Data Integration Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
After You Create the Data Integration Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Creating the Catalog Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Email Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Email Notification Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Email Notification Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Troubleshooting Email Notifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Content Management Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Create the Content Management Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Table of Contents 5
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
6 Table of Contents
Preface
The Informatica 10.2 Administrator Reference for Enterprise Data Catalog is written for the system
administrator who is responsible for installing the Informatica product. This guide assumes you have
knowledge of operating systems, relational database concepts, and the database engines, flat files, or
mainframe systems in your environment. This guide also assumes you are familiar with the interface
requirements for your supporting applications.
Informatica Resources
Informatica Network
Informatica Network hosts Informatica Global Customer Support, the Informatica Knowledge Base, and other
product resources. To access Informatica Network, visit https://network.informatica.com.
To access the Knowledge Base, visit https://kb.informatica.com. If you have questions, comments, or ideas
about the Knowledge Base, contact the Informatica Knowledge Base team at
[email protected].
Informatica Documentation
To get the latest documentation for your product, browse the Informatica Knowledge Base at
https://kb.informatica.com/_layouts/ProductDocumentation/Page/ProductDocumentSearch.aspx.
If you have questions, comments, or ideas about this documentation, contact the Informatica Documentation
team through email at [email protected].
7
Informatica Product Availability Matrixes
Product Availability Matrixes (PAMs) indicate the versions of operating systems, databases, and other types
of data sources and targets that a product release supports. If you are an Informatica Network member, you
can access PAMs at
https://network.informatica.com/community/informatica-network/product-availability-matrices.
Informatica Velocity
Informatica Velocity is a collection of tips and best practices developed by Informatica Professional
Services. Developed from the real-world experience of hundreds of data management projects, Informatica
Velocity represents the collective knowledge of our consultants who have worked with organizations from
around the world to plan, develop, deploy, and maintain successful data management solutions.
If you are an Informatica Network member, you can access Informatica Velocity resources at
http://velocity.informatica.com.
If you have questions, comments, or ideas about Informatica Velocity, contact Informatica Professional
Services at [email protected].
Informatica Marketplace
The Informatica Marketplace is a forum where you can find solutions that augment, extend, or enhance your
Informatica implementations. By leveraging any of the hundreds of solutions from Informatica developers
and partners, you can improve your productivity and speed up time to implementation on your projects. You
can access Informatica Marketplace at https://marketplace.informatica.com.
To find your local Informatica Global Customer Support telephone number, visit the Informatica website at
the following link:
http://www.informatica.com/us/services-and-training/support-services/global-support-centers.
If you are an Informatica Network member, you can use Online Support at http://network.informatica.com.
8 Preface
Chapter 1
Overview
Enterprise Data Catalog brings together all data assets in an enterprise and presents a comprehensive view
of the data assets and data asset relationships. Enterprise Data Catalog is installed within the Informatica
domain. The Informatica domain is the administrative unit for the Enterprise Data Catalog environment. The
Informatica domain includes a collection of nodes that represent the machines on which the application
services run. Application services represent server-based functionality. Enterprise Data Catalog application
services include services that you create and system services that are created when you create the domain.
To use Enterprise Data Catalog, you must install the Enterprise Data Catalog services and create a domain.
The Enterprise Data Catalog services consist of services to support the domain and application services to
perform tasks and manage databases. When you install Enterprise Data Catalog services on a machine, you
install all the files for all services.
You can see the following topics to get started after installing Enterprise Data Catalog:
Enterprise Data Catalog Services
Informatica Security
Information about securing the Informatica domain from internal and external threats along with the
types of security that you can configure. This topic also includes information about supported user
security methods and information about securing communication within the domain.
Domain Configuration
Information about creating the different application services and the configuration steps to be
performed after creating the services.
Information about managing users and groups that you can create and configure in the Informatica
domain.
Information about the different privileges and roles that you can configure for the users and groups.
Permissions
Information about the permissions that you can configure for the users and groups to access different
objects in the Informatica domain.
Note: This document includes basic reference information about Informatica Administrator tasks that you
can perform in Enterprise Data Catalog. For more information about the Informatica Administrator concepts
and tasks, see the following guides:
9
• Informatica Application Service Guide
• Informatica Security Guide
• Informatica Enterprise Data Catalog Installation and Configuration Guide
10 Chapter 1: Overview
Chapter 2
When you create an application service, you designate a node to run the service process. The service process
is the run-time representation of a service running on a node. The service type determines how many service
processes can run at a time.
If you have the high availability option, you can run an application service on multiple nodes. If you do not
have the high availability option, configure each application service to run on one node.
Some application services require databases to store information processed by the application service. When
you plan the Informatica domain, you also need to plan the databases required by each application service.
Application Services
Application services represent server-based functionality. After you complete the installation, you create
application services based on the license key generated for your organization.
When you create an application service, you designate a node to run the service process. The service process
is the run-time representation of a service running on a node. The service type determines how many service
processes can run at a time.
If you have the high availability option, you can run an application service on multiple nodes. If you do not
have the high availability option, configure each application service to run on one node.
Some application services require databases to store information processed by the application service. When
you plan the Informatica domain, you also need to plan the databases required by each application service.
For more information about application services, see the Informatica Application Service Guide.
11
Application Services and Ports
Informatica domain services and application services in the Informatica domain have unique ports.
The following table lists the default port associated with the Content Management Service:
Content Management Service (HTTPS) No default port. Enter the required port number when you create the
service.
The following table lists the default port associated with the Data Integration Service:
Data Integration Service (HTTPS) No default port. Enter the required port number when you create the
service.
Profiling Warehouse database No default port. Enter the database port number.
Human Task database No default port. Enter the database port number.
When you plan the application services, you must account for the associated services that connect to the
application service. You also must plan the relational databases that are required to create the application
service. When you install Enterprise Data Catalog, the installer creates the required application services.
Optionally, you can also create the application services after you complete the installation.
The Analyst Service connects to a Data Integration Service that runs profiles, scorecards, and mapping
specifications. The Analyst Service also connects to a Data Integration Service that runs workflows.
Additionally, the Analyst Service connects to the Analyst tool, a flat file cache directory to store uploaded flat
files, and a business glossary export file directory.
You can use the Administrator tool to create and recycle an Analyst Service in the Informatica domain and to
access the Analyst tool. When you recycle the Analyst Service, the Service Manager restarts the Analyst
Service.
You can run more than one Analyst Service on the same node. You can associate a Model Repository Service
with one Analyst Service. You can associate one Data Integration Service with more than one Analyst Service.
The Analyst Service detects the associated Search Service based on the Model Repository Service assigned
to the Analyst Service.
When you preview or run mappings, profiles, SQL data services, and web services in the Analyst tool or the
Developer tool, the application client sends requests to the Data Integration Service to perform the data
integration tasks. When you start a command from the command line or an external client to run mappings,
SQL data services, web services, and workflows in an application, the command sends the request to the
Data Integration Service.
When you preview or run mappings and profiles, the application client sends requests to the Data Integration
Service to perform the data integration tasks. When you start a command from the command line or an
external client to run mappings, the command sends the request to the Data Integration Service.
Create and configure a Data Integration Service in the Administrator tool. You can create one or more Data
Integration Services on a node. Based on your license, the Data Integration Service can be highly available.
When you access a Model repository object from Catalog Administrator or the Data Integration Service, the
client or service sends a request to the Model Repository Service. The Model Repository Service process
fetches, inserts, and updates the metadata in the Model repository database tables.
Note: When you create the Model Repository Service, you do not associate it with other application services.
Catalog Service
The Catalog Service is an application service that runs Enterprise Data Catalog in the Informatica domain.
The Catalog Service manages the connections between service components and the users that have access
to Enterprise Data Catalog and Catalog Administrator.
The catalog represents an indexed inventory of all the configured data assets in an enterprise. You can find
metadata and statistical information, such as profile statistics, data asset ratings, data domains, and data
relationships, in the catalog.
The Content Management Service manages the following types of reference data:
You use address reference data when you want to validate the postal accuracy of an address or fix
errors in an address. Use the Address Validator transformation to perform address validation.
Identity populations
You use identity population data when you want to perform duplicate analysis on identity data. An
identity is a set of values within a record that collectively identify a person or business. Use a Match
transformation or Comparison transformation to perform identity duplicate analysis.
You use probabilistic or classifier model data when you want to identify the type of information that a
string contains. Use a probabilistic model in a Parser or Labeler transformation. Use a classifier model in
a Classifier transformation. Probabilistic models and classifier models use probabilistic logic to identify
or infer the type of information in the string. Use a Classifier transformation when each input string
contains a significant amount of data.
You use reference tables to verify the accuracy or structure of input data values in data quality
transformations.
The Content Management Service also compiles rule specifications into mapplets.
Use the Administrator tool to administer the Content Management Service. Recycle the Content Management
Service to start it.
Security for the Informatica domain includes the following types of security:
Infrastructure Security
Infrastructure security protects the Informatica domain against unauthorized access to or modification
of services and resources in the Informatica domain. Infrastructure security includes the following
aspects:
Operational Security
Operational security controls access to the data and services in the Informatica domain. Operational
security includes the following aspects:
• Setting restrictions to user access to data and metadata based on the role of the user in the
organization
• Setting restrictions to user ability to perform operations within the Informatica domain based on the
user role in the organization
Informatica stores the domain configuration information and the list of users authorized to access the
domain in the domain configuration repository. The domain configuration repository also contains the
groups, roles, privileges, and permissions that are assigned to each user in the Informatica domain.
Informatica organizes the list of users by security domains. A security domain contains a collection of user
accounts. A domain can have multiple security domains.
You can enable different options to secure specific components in the domain. You do not have to secure all
components in the domain. For example, you can secure the communication between the services in the
domain but not secure the connection between the Model Repository Service and the repository database.
16
Informatica uses the TCP/IP and HTTP protocols to communicate between components in the domain. The
domain uses SSL certificates to secure communication between components.
When you install the Informatica services, you can enable secure communication for the services in the
domain and for the Administrator tool. After installation, you can configure secure communication in the
domain in the Administrator tool or from the command line.
During installation, the installer generates an encryption key to encrypt sensitive data, such as passwords,
that are stored in the domain. You can provide the keyword that the installer uses to generate the encryption
key. After installation, you can change the encryption key for sensitive data. You must upgrade the content of
repositories to update the encrypted data.
Within the domain, you can select options to enable secure communication for the following
components:
• Between the Service Manager, the services in the domain, and the Informatica client tools
• Between the domain and the domain configuration repository
• Between the repository services and repository databases
You can secure the connection between a web application service, such as the Analyst Service, and the
browser
You can enable secure communication between the Data Integration Service and the source and target
databases.
Data storage
Informatica encrypts sensitive data, such as passwords, when it stores data in the domain. Informatica
generates an encryption key based on a keyword that you provide during installation. Informatica uses
the encryption key to encrypt and decrypt sensitive data that are stored in the domain.
You can configure secure communication between services within the domain.
You can configure secure communication between Informatica domain components and web browsers
or web service clients.
Each method of configuring secure communication is independent of the other methods. When you configure
secure communication for one set of components, you do not need to configure secure communication for
any other set.
After you secure the domain, configure the Informatica client applications to work with a secure domain.
Informatica provides an SSL certificate that you can use to secure the domain. However, you should provide
a custom SSL certificate for domains that require a higher level of security, such as a domain in a production
environment. Specify the keystore and truststore files that contain the SSL certificates you want to use.
Note: Informatica provides SSL certificates for evaluation purposes. If you do not provide an SSL certificate,
Informatica uses the same default private key for all Informatica installations. The security of your domain
could be compromised. Provide an SSL certificate to ensure a high level of security for the domain. The
certificate that you provide can be self-signed or from a certificate authority (CA).
When you configure secure communication for the domain, you secure the connections between the
following components:
Privileges determine the actions that users can complete on domain objects. Permissions define the level of
access a user has to a domain object. Domain objects include the domain, folders, nodes, grids, licenses,
database connections, operating system profiles, and application services.
Even if a user has the domain privilege to complete certain actions, the user might also require permission to
complete the action on a particular object. For example, a user has the Manage Services domain privilege
which grants the user the ability to edit application services. However, the user also must have permission on
the application service. A user with the Manage Services domain privilege and permission on the
Development Repository Service but not on the Production Repository Service can edit the Development
Repository Service but not the Production Repository Service.
Even if a user has the domain privilege to complete certain actions, the user might also require permission to
complete the action on a particular object.
To log in to the Administrator tool, a user must have the Access Informatica Administrator domain privilege.
If a user has the Access Informatica Administrator privilege and permission on an object, but does not have
the domain privilege that grants the ability to modify the object type, then the user can view the object. For
example, if a user has permission on a node, but does not have the Manage Nodes and Grids privilege, the
user can view the node properties but cannot configure, shut down, or remove the node.
To log in to the Administrator tool, a user must have the Access Informatica Administrator domain privilege.
If a user has the Access Informatica Administrator privilege and permission on an object, but does not have
the domain privilege that grants the ability to modify the object type, then the user can view the object.
If a user does not have permission on a selected object in the Navigator, the contents panel displays a
message indicating that permission on the object is denied.
The Informatica domain can use the following types of authentication to authenticate users in the
Informatica domain:
Native user accounts are stored in the Informatica domain and can only be used within the Informatica
domain. LDAP user accounts are stored in an LDAP directory service and are shared by applications within
the enterprise.
You can select the type of authentication to use in the Informatica domain during installation. You can use
native authentication and LDAP authentication together in the Informatica domain. The Service Manager
authenticates the users based on the security domain. If a user belongs to the native security domain, the
Service Manager authenticates the user in the domain configuration repository. If the user belongs to an
LDAP security domain, the Service Manager passes the user name and password to the LDAP server for
authentication.
The native security domain is created at installation and cannot be deleted. An Informatica domain can have
only one native security domain. You create and maintain user accounts in the native security domain in the
Administrator tool. The Service Manager stores details about the user accounts, including the user
credentials and privileges, in the domain configuration repository.
To enable the Informatica domain to use LDAP user authentication, you must set up a connection to an LDAP
server and specify the users and groups from the LDAP directory service that can have access to the
Informatica domain. You can use the Administrator tool to set up the connection to the LDAP server.
When you synchronize the LDAP security domains with the LDAP directory service, the Service Manager
imports the list of LDAP user accounts with access to the Informatica domain into the LDAP security
domains. When you assign privileges and permissions to users in LDAP security domains, the Service
Manager stores the information in the domain configuration repository. The Service Manager does not store
the user credentials in the domain configuration repository.
When a user logs in, the Service Manager passes the user name and password to the LDAP server for
authentication.
Note: The Service Manager requires that LDAP users log in to a client application with a password even
though an LDAP directory service may allow a blank password for anonymous login mode.
Configure the LDAP security domains to store the list of users from an LDAP directory service that you want
to allow access to the Informatica domain and client applications. The LDAP security domain does not store
user account credentials. When a user logs in to an Informatica client, the Service Manager verifies that the
user account is in a security domain. If the user account belongs to an LDAP security domain, the Service
Manager authenticates the user with the LDAP directory service.
After installation, you can add users and groups to the native security domain. If you have users in an LDAP
directory service that you want to give access to Informatica client applications, you can set up LDAP
security domains in addition to the native security domain. Configure a connection to the LDAP server and
import the users and groups into the LDAP security domains.
After installation, you can configure a connection to the LDAP server and import users and groups from the
LDAP directory service into the LDAP security domain.
Domain configuration includes tasks such as verifying code pages, configuring the environment variables for
the domain, and configuring the firewall.
Verify that the domain configuration database is compatible with the code pages of the application services that you
create in the domain.
The Service Manager synchronizes the list of users in the domain with the list of users and group in each
application service. If a user name in the domain has characters that the code page of the application
service does not recognize, characters do not convert correctly and inconsistencies occur.
Verify that the locale settings on machines that access the Administrator tool and the Informatica client tools is
compatible with code pages of repositories in the domain.
If the locale setting is not compatible with the repository code page, you cannot create an application
service.
Use the following command to verify that the value for the locale environment variable is compatible with the
language settings for the machine and the type of code page you want to use for the repository:
locale -a
21
The command returns the languages installed on the Linux operating system and the existing locale settings.
Locale on Linux
Linux allows different locale values to represent the same locale. For example, “utf8,” “UTF-8,” “UTF8,”
and “utf-8” represent the same locale on a Linux machine. Informatica requires that you use a specific
value for each locale on a Linux machine. Make sure that you set the LANG environment variable
appropriately for all Linux machines.
For Oracle database clients, set NLS_LANG to the locale you want the database client and server to use
with the login. A locale setting consists of the language, territory, and character set. The value of
NLS_LANG depends on the configuration. For example, if the value is american_america.UTF8, set the
variable in a C shell with the following command:
setenv NLS_LANG american_america.UTF8
Incorrectly configured environment variables can cause the Informatica domain or nodes to fail to start or
can cause connection problems between the Informatica clients and domain.
To configure environment variables on Linux, log in with the system user account you used to install
Enterprise Data Catalog.
INFA_JAVA_OPTS
The following table lists the minimum requirement for the maximum heap size settings, based on the
number of users and services in the domain:
Note: The maximum heap size settings in the table are based on the number of application services in
the domain.
If the domain has more than 1,000 users, update the maximum heap size based on the number of users
in the domain.
You can use the INFA_JAVA_OPTS environment variable to configure the amount of system memory
used by Enterprise Data Catalog. For example, to configure 1 GB of system memory for the Informatica
daemon on Linux in a C shell, use the following command:
setenv INFA_JAVA_OPTS “-Xmx1024m”
Restart the node for the changes to take effect.
INFA_DOMAINS_FILE
The installer creates a domains.infa file in the Enterprise Data Catalog installation directory. The
domains.infa file contains the connectivity information for the gateway nodes in a domain, including the
domain names, domain host names, and domain host port numbers.
Set the value of the INFA_DOMAINS_FILE variable to the path and file name of the domains.infa file.
Configure the INFA_DOMAINS_FILE variable on the machine where you install the Enterprise Data
Catalog services.
INFA_HOME
Use INFA_HOME to designate the Enterprise Data Catalog installation directory. If you modify the
Enterprise Data Catalog directory structure, you need to set the environment variable to the location of
the Enterprise Data Catalog installation directory or the directory where the installed Enterprise Data
Catalog files are located.
For example, you use a softlink in Linux for any of the Enterprise Data Catalog directories. To configure
INFA_HOME so that any Enterprise Data Catalog application or service can locate the other Enterprise
Data Catalog components it needs to run, set INFA_HOME to the location of the Enterprise Data Catalog
installation directory.
INFA_TRUSTSTORE
If you enable secure communication for the domain, set the INFA_TRUSTSTORE variable with the
directory that contains the truststore files for the SSL certificates. The directory must contain truststore
files named infa_truststore.jks and infa_truststore.pem.
You must set the INFA_TRUSTSTORE variable if you use the default SSL certificate provided by
Informatica or a certificate that you provide.
INFA_TRUSTSTORE_PASSWORD
If you enable secure communication for the domain and you specify the SSL certificate to use, set the
INFA_TRUSTSTORE_PASSWORD variable with the password for the infa_truststore.jks that contains the
SSL certificate. The password must be encrypted. Use the command line program pmpasswd to encrypt
the password.
The following table describes the values that you set for the LD_LIBRARY_PATH for the different databases:
Database Value
Oracle <DatabasePath>/lib
ODBC <CLOSEDODBCHOME>/lib
If the Informatica domain uses native user authentication, the domain configuration repository also contains
the user credentials. If the domain uses LDAP authentication, the domain configuration repository does not
contain the user credentials. All LDAP user credentials are stored outside the Informatica domain, in the
LDAP directory service.
When you create the Informatica domain during installation, the installer creates a domain configuration
repository in a relational database. You must specify the database in which to create the domain
configuration repository. You can create the repository on a database secured with the SSL protocol.
Some application services depend on other application services. When you create these dependent
application services, you must provide the name of other running application services. Review the application
service dependencies to determine the order that you must create the services. For example, you must create
the Model Repository Service and Data Integration Service before you create the Catalog Service.
Before you create the application services, verify that you have completed the prerequisite tasks required by
the installation and configuration process. After you create each application service, review the next tasks
that you need to complete.
You must configure the database client environment variables on the machines that run the Data
Integration Service.
25
Create a keytab file for the service.
If you set the service principal level at the process level, create a unique keytab file for the following
services:
Note: The name of the service that you create must match the service name in the keytab file name.
To set up a secure connection to the application client, create a keystore file for the Catalog Service.
Verify that the domain configuration database is compatible with the code pages of the application
services that you create in the domain.
Verify that the locale settings on machines that access the Informatica Administrator tool and the
Enterprise Data Catalog tools is compatible with the code pages of the repositories in the domain.
Configure library path environment variables on Linux.
Configure the library path environment variables on the machines that run the Data Integration Service.
Create connections to the databases that the application services access though cluster connectivity.
For example, the Data Integration Service depends on the Model Repository Service. When you create a Data
Integration Service, the Informatica Administrator tool prompts you for the name of a Model Repository
Service. Therefore, you must create a Model Repository Service before you create a Data Integration Service.
Services that access Model repository objects can depend on each other. The application service
dependencies determine the order that you must create the services.
When you access a Model repository object from the Enterprise Data Catalog tools or the Data Integration
Service, the client or service sends a request to the Model Repository Service. The Model Repository Service
process fetches, inserts, and updates the metadata in the Model repository database tables.
Property Description
Name Name of the service. The name is not case sensitive and must be unique within the domain. It
cannot exceed 128 characters or begin with @. It also cannot contain spaces or the following
special characters:
`~%^*+={}\;:'"/?.,<>|!()][
Description Description of the service. The description cannot exceed 765 characters.
Location Domain and folder where the service is created. Click Browse to choose a different folder. You
can move the service after you create it.
Backup Nodes If your license includes high availability, nodes on which the service can run if the primary node
is unavailable.
4. Click Next.
The New Model Repository Service - Step 2 of 2 page appears.
Property Description
Database Schema Available for Microsoft SQL Server. Name of the schema that will contain Model
repository tables.
Database Available for IBM DB2. Name of the tablespace in which to create the tables. For a multi-
Tablespace partition IBM DB2 database, the tablespace must span a single node and a single
partition.
6. Enter the JDBC connection string that the service uses to connect to the Model repository database.
Use the following syntax for the connection string for the selected database type:
Microsoft SQL Server - Microsoft SQL Server that uses the default instance
jdbc:informatica:sqlserver://
<host_name>:<port_number>;DatabaseName=<database_name>;Snapsho
tSerializable=true
- Microsoft SQL Server that uses a named instance
jdbc:informatica:sqlserver://<host_name>
\<named_instance_name>;DatabaseName=<database_name>;SnapshotSe
rializable=true
Oracle jdbc:informatica:oracle://
<host_name>:<port_number>;SID=<database_name>;MaxPooledStatement
s=20;CatalogOptions=0;BatchPerformanceWorkaround=true
7. If the Model repository database is secured with the SSL protocol, you must enter the secure database
parameters in the Secure JDBC Parameters field.
Enter the parameters as name=value pairs separated by semicolon characters (;). For example:
param1=value1;param2=value2
EncryptionMethod Required. Indicates whether data is encrypted when transmitted over the network.
This parameter must be set to SSL.
ValidateServerCertificate Optional. Indicates whether Informatica validates the certificate that the database
server sends.
If this parameter is set to True, Informatica validates the certificate that the
database server sends. If you specify the HostNameInCertificate parameter,
Informatica also validates the host name in the certificate.
If this parameter is set to False, Informatica does not validate the certificate that
the database server sends. Informatica ignores any truststore information that you
specify.
HostNameInCertificate Optional. Host name of the machine that hosts the secure database. If you specify
a host name, Informatica validates the host name included in the connection string
against the host name in the SSL certificate.
TrustStore Required. Path and file name of the truststore file that contains the SSL certificate
for the database.
If you do not include the path for the truststore file, Informatica looks for the file in
the following default directory: <Informatica installation directory>/
tomcat/bin
TrustStorePassword Required. Password for the truststore file for the secure database.
Note: Informatica appends the secure JDBC parameters to the JDBC connection string. If you include the
secure JDBC parameters directly in the connection string, do not enter any parameter in the Secure
JDBC Parameters field.
8. Click Test Connection to verify that you can connect to the database.
9. Select No content exists under specified connection string. Create new content.
10. Click Finish.
The domain creates the Model Repository Service, creates content for the Model repository in the
specified database, and enables the service.
After you create the service through the wizard, you can edit the properties or configure other properties.
When you run scans on resources and view the metadata and profiling statistics in Enterprise Data Catalog,
the client tool sends requests to the Data Integration Service to perform the data integration jobs.
Before you create the Data Integration Service, verify that you have created and enabled the Model Repository
Service. You also need to verify that you have created a Model repository user that the Data Integration
Service can use to access the Model Repository Service.
Property Description
Name Name of the service. The name is not case sensitive and must be unique within the domain. It
cannot exceed 128 characters or begin with @. It also cannot contain spaces or the following
special characters:
`~%^*+={}\;:'"/?.,<>|!()][
Description Description of the service. The description cannot exceed 765 characters.
Location Domain and folder where the service is created. Click Browse to choose a different folder.
You can move the service after you create it.
Assign Select Node to configure the service to run on a node. If your license includes grid, you can
create a grid and assign the service to run on the grid after you create the service.
Backup Nodes If your license includes high availability, nodes on which the service can run if the primary
node is unavailable.
Username User name that the service uses to access the Model Repository Service. Enter the Model
repository user that you created.
Security Domain LDAP security domain for the Model repository user. The field appears when the Informatica
domain contains an LDAP security domain. Not available for a domain with Kerberos
authentication.
6. Click Next.
The New Data Integration Service - Step 2 of 14 page appears.
7. Enter the HTTP port number to use for the Data Integration Service.
8. Accept the default values for the remaining security properties. You can configure the security properties
after you create the Data Integration Service.
9. Select Enable Service.
The Model Repository Service must be running to enable the Data Integration Service.
10. Verify that the Move to plugin configuration page is not selected.
11. Click Next.
The New Data Integration Service - Step 3 of 14 page appears.
12. Set the Launch Job Options property to one of the following values:
• In the service process. Configure when you run SQL data service and web service jobs. SQL data
service and web service jobs typically achieve better performance when the Data Integration Service
runs jobs in the service process.
• In separate local processes. Configure when you run mapping, profile, and workflow jobs. When the
Data Integration Service runs jobs in separate local processes, stability increases because an
unexpected interruption to one job does not affect all other jobs.
If you configure the Data Integration Service to run on a grid after you create the service, you can
configure the service to run jobs in separate remote processes.
13. Accept the default values for the remaining execution options and click Next.
The New Data Integration Service - Step 4 of 14 page appears.
Module Description
SQL Service Module Runs SQL queries from a third-party client tool to an SQL data service.
1. Informatica Cluster Service if you choose internal Hadoop cluster for deploying Enterprise Information
Catalog.
2. Catalog Service
3. Content Management Service
Note: The Catalog Service has the same privileges as the user account that creates it. Ensure that the user
account does not have privileges to read or modify sensitive files on the system.
1. In the Administrator tool, select a domain, and click the Services and Nodes tab.
2. On the Actions menu, click New > Catalog Service.
Property Description
Name Name of the service. The name is not case-sensitive and must be unique within the domain. The
name cannot exceed 128 characters or begin with @. The name cannot contain character spaces.
The characters in the name must be compatible with the code page of the Model repository that
you associate with the Catalog Service.
The name cannot contain the following special characters:
`~%^*+={}\;:'"/?.,<>|!()][
Description Description of the service. The description cannot exceed 765 characters.
License License to assign to the Catalog Service. Select the license that you installed with Informatica.
Assign Node configuration type. Specify whether the node is in a single node, high availability, or grid
environment.
Node Node in the Informatica domain on which the Catalog Service runs. If you change the node, you
must recycle the Catalog Service.
4. Click Next.
The New Catalog Service - Step 2 of 4 dialog box appears.
5. Configure the application service properties in the dialog box.
The following table describes the properties:
Property Description
Model Repository Model Repository Service to associate with the Catalog Service. The Model Repository
Service Service manages the Model repository that Enterprise Data Catalog uses. If you update
the property to specify a different Model Repository Service, recycle the Catalog Service.
User name The database user name for the Model repository.
Password An encrypted version of the database password for the Model repository.
Data Integration Data Integration Service that you want to associate with the Catalog Service so that you
Service can perform profiling and data domain discovery in Enterprise Data Catalog. If you update
the property to specify a different Data Integration Service, recycle the Catalog Service.
Content Optional property. Application service that manages reference data. You specify this
Management property if you want to include data domains in the Enterprise Data Catalog results.
Service
6. Click Next.
The New Catalog Service - Step 3 of 4 dialog box appears.
7. Configure the security properties in the dialog box.
Property Description
HTTP Port A unique HTTP port number used for each Data Integration Service process. The defaults
is 8085.
Enable Transport Indicates that the Catalog Service must use HTTPS. If you did not configure the Data
Layer Security Integration Service to use HTTPS, the Catalog Service does not start.
Keystore File Path and file name of the keystore file. The keystore file contains the keys and
certificates required if you use the SSL security protocol with Catalog Administrator.
Required if you select Enable Transport layer Security.
Keystore Password Password for the keystore file. Required if you select Enable Transport layer Security.
8. Click Next.
The New Catalog Service - Step 4of 4 dialog box appears.
9. Configure the Hadoop cluster properties in the dialog box.
The following table describes the properties:
Property Description
External Cluster Indicates the deployment type for Enterprise Data Catalog. You can choose to deploy in an
internal Hadoop cluster or an external Hadoop cluster on Cloudera.
Yarn resource Applies to external cluster. The service within Hadoop that submits the MapReduce tasks to
manager URI specific nodes in the cluster.
Use the following format:<Hostname>:<Port>
Where
- Hostname is the name or IP address of the Yarn resource manager.
- Port is the port number on which Yarn resource manager listens for Remote Procedure
Calls (RPC).
Yarn resource Applies to external cluster. http URI value for the Yarn resource manager.
manager http URI
Yarn resource Applies to external cluster. Scheduler URI value for the Yarn resource manager.
manager
scheduler URI
Service Cluster Name of the service cluster. Ensure that you have a directory /Informatica/LDM/
Name <ServiceClusterName> in HDFS.
Note: If you do not specify a service cluster name, Enterprise Data Catalog considers
DomainName_CatalogServiceName as the default value. You must then have the /
Informatica/LDM/<DomainName>_<CatalogServiceName> directory in HDFS.
Otherwise, Catalog Service might fail.
Informatica Applies to internal cluster. Name of the Informatica Cluster Service, which is an application
Cluster Service service that Enterprise Data Catalog uses in internal cluster deployment.
Email Service
The Email Service is a system service that manages email notifications on the status of Catalog Service.
Enable the Email Service to allow Informatica administrators to configure email notifications. You can
configure the service to run on multiple nodes. Designate the primary node to run the service. All other nodes
are backup nodes for the service. If the primary node is not available, the service runs on a backup node.
You can perform the following tasks to complete the email notification process:
1. Configure and enable the Email Service in Informatica Administrator. For more information about
enabling the Email Service, see the Informatica Application Services Guide.
Verify the following conditions are true when you troubleshoot email notifications:
• Catalog Service and associated services, such as Model Repository Service and Data Integration Service,
are enabled and running.
• If you changed the Model Repository Service associated with the Email Service, you recycled the Email
Service followed by the Catalog Service.
• If you changed the Email Service configuration, you restarted the Email Service followed by the Catalog
Service.
• You configured a valid email ID for the email recipient or user in Informatica domain.
The Content Management Service uses the Data Integration Service to run mappings to transfer data
between reference tables and external data sources. The Content Management Service also provides
transformations, mapping specifications, and rule specifications with the following types of reference data:
Before you create the Content Management Service, verify that you have created and enabled the Model
Repository Service and Data Integration Service. You also need to verify that you have created a Model
repository user that the Content Management Service can use to access the Model Repository Service.
Property Description
Name Name of the service. The name is not case sensitive and must be unique within the domain.
It cannot exceed 128 characters or begin with @. It also cannot contain spaces or the
following special characters:
`~%^*+={}\;:'"/?.,<>|!()][
Description Description of the service. The description cannot exceed 765 characters.
Location Domain and folder where the service is created. Click Browse to choose a different folder.
You can move the service after you create it.
HTTP Port HTTP port number to use for the Content Management Service.
Data Integration Data Integration Service to associate with the service. The Data Integration Service and the
Service Content Management Service must run on the same node.
Username User name that the service uses to access the Model Repository Service. Enter the Model
repository user that you created.
Security Domain LDAP security domain for the Model repository user. The field appears when the Informatica
domain contains an LDAP security domain. Not available for a domain with Kerberos
authentication.
Reference Data Reference data warehouse connection that you created for the Content Management Service
Location to access the reference data warehouse. Click Select to select the connection.
4. Click Next.
The New Content Management Service - Step 2 of 2 page appears.
5. Accept the default values for the security properties.
6. Select Enable Service.
The Model Repository Service and Data Integration Service must be running to enable the Content
Management Service.
7. Click Finish.
The domain creates and enables the Content Management Service.
After you create the service through the wizard, you can edit the properties or configure other properties.
During installation, a default administrator user account is created. Use the default administrator account to
log in to the Informatica domain and manage application services, domain objects, and other user accounts.
When you log in to the Informatica domain after installation, change the password to ensure security for the
Informatica domain and applications.
• Users. You can set up different types of user accounts in the Informatica domain. Users can perform
tasks based on the roles, privileges, and permissions assigned to them.
• Authentication. When a user logs in to an application client, the Service Manager authenticates the user
account in the Informatica domain and verifies that the user can use the application client. The
Informatica domain can use native or LDAP authentication to authenticate users. The Service Manager
organizes user accounts and groups by security domain. It authenticates users based on the security
domain the user belongs to.
• Groups. You can set up groups of users and assign different roles, privileges, and permissions to each
group. The roles, privileges, and permissions assigned to the group determines the tasks that users in the
group can perform within the Informatica domain.
• Privileges and roles. Privileges determine the actions that users can perform in application clients. A role
is a collection of privileges that you can assign to users and groups. You assign roles or privileges to
users and groups for the domain and for application services in the domain.
• Account lockout. You can configure account lockout to lock a user account when the user specifies an
incorrect login in the Administrator tool or any application clients, like the Developer tool and Analyst tool.
You can also unlock a user account.
Users
A user with an account in the Informatica domain can log in to the following application clients:
• Informatica Administrator
• Informatica Developer
The Users section of the Navigator organizes users into security domain folders. A security domain is a
collection of user accounts and groups in an Informatica domain. Native authentication uses the Native
security domain which contains the users and groups created and managed in the Administrator tool. LDAP
authentication uses LDAP security domains which contain users and groups imported from the LDAP
directory service.
39
When you select a security domain folder in the Users section of the Navigator, the contents panel displays
all users belonging to the security domain. Right-click a user and select Navigate to Item to display the user
details in the contents panel.
When you select a user in the Navigator, the contents panel displays the following tabs:
• Overview. Displays general properties of the user and all groups to which the user belongs.
• Privileges. Displays the privileges and roles assigned to the user for the domain and for application
services in the domain.
• Default administrator
• Domain administrator
• Application client administrator
• User
An Informatica domain can have the following types of accounts:
• Default administrator
• Domain administrator
• Application client administrator
• User
The Informatica domain has a default administrator account.
Default Administrator
When you install Informatica services, the installer creates the default administrator with a user name and
password you provide. You can use the default administrator account to initially log in to the Administrator
tool.
The default administrator has administrator permissions and privileges on the domain and all application
services.
• Create, configure, and manage all objects in the domain, including nodes, application services, and
administrator and user accounts.
• Configure and manage all objects and user accounts created by other domain administrators and
application client administrators.
• Log in to any application client.
The default administrator is a user account in the native security domain. You cannot create a default
administrator. You cannot disable or modify the user name or privileges of the default administrator. You can
change the default administrator password.
Domain Administrator
A domain administrator can create and manage objects in the domain.
The domain administrator can log in to the Administrator tool and create and configure application services
in the domain. However, by default, the domain administrator cannot log in to application clients. The default
The domain administrator can log in to the Administrator tool and configure application services in the
domain. However, by default, the domain administrator cannot log in to application clients. The default
administrator must explicitly give a domain administrator full permissions and privileges to the application
services so that they can log in and perform administrative tasks in the application clients.
To create a domain administrator, assign a user the Administrator role for a domain.
By default, the application client administrator does not have permissions or privileges on the domain.
Without permissions or privileges on the domain, the application client administrator cannot log in to the
Administrator tool to manage the application service.
Has full permissions and privileges in Informatica Developer. The Informatica Developer administrator
can log in to Informatica Developer to create and manage projects and objects in projects and perform
all tasks in the application client.
To create an Informatica Developer administrator, assign a user the Administrator role for a Model
Repository Service.
Catalog administrator
The administration tasks include configuring resources, assigning schedules, and custom attributes. The
administrator also monitors the tasks that extract metadata using the resources.
User
A user with an account in the Informatica domain can perform tasks in the application clients.
Typically, the default administrator or a domain administrator creates and manages user accounts and
assigns roles, permissions, and privileges in the Informatica domain. However, any user with the required
domain privileges and permissions can create a user account and assign roles, permissions, and privileges.
Users can perform tasks in application clients based on the privileges and permissions assigned to them.
Managing Users
You can create, edit, and delete users in the native security domain. You cannot delete or modify the
properties of user accounts in the LDAP security domains. You cannot modify the user assignments to LDAP
groups.
You can create, edit, and delete users depending on the type of license. You can assign roles, permissions,
and privileges to a user account. The roles, permissions, and privileges assigned to the user determines the
tasks the user can perform within the Informatica domain.
You can assign roles, permissions, and privileges to a user account in the native security domain or an LDAP
security domain. The roles, permissions, and privileges assigned to the user determines the tasks the user
can perform within the Informatica domain.
Users 41
Groups
A group is a collection of users and groups that can have the same privileges, roles, and permissions.
The Groups section of the Navigator organizes groups into security domain folders. A security domain is a
collection of user accounts and groups in an Informatica domain. Native authentication uses the Native
security domain which contains the users and groups created and managed in the Administrator tool. LDAP
authentication uses LDAP security domains which contain users and groups imported from the LDAP
directory service.
The Groups section of the Navigator organizes groups into security domain folders. A security domain is a
collection of user accounts and groups in an Informatica domain. Native authentication uses the Native
security domain which contains the users and groups created and managed in the Administrator tool.
The Groups section of the Navigator organizes groups into security domain folders. A security domain is a
collection of user accounts and groups in an Informatica domain. Native authentication uses the Native
security domain which contains the users and groups created and managed in the Administrator tool.
When you select a security domain folder in the Groups section of the Navigator, the contents panel displays
all groups belonging to the security domain. Right-click a group and select Navigate to Item to display the
group details in the contents panel.
When you select a group in the Navigator, the contents panel displays the following tabs:
• Overview. Displays general properties of the group and users assigned to the group.
• Privileges. Displays the privileges and roles assigned to the group for the domain and for application
services in the domain.
Default Groups
The Informatica domain has a set of user groups that are created during installation.
By default, the Informatica domain has the following user groups after installation:
• Administrator
• Everyone
• Operator
Administrator Group
The Informatica domain includes a default group named Administrator. The default administrator account
created during installation belongs to this group.
The Administrator group has administrator permissions and privileges on the domain and all application
services. You can add users to or remove users from the Administrator group. All users in the Administrator
group have the same permissions and privileges as the default administrator created during installation.
You cannot delete the default administrator account from the Administrator group and you cannot delete the
Administrator group.
Everyone Group
The Informatica domain includes a default group named Everyone. All users in the domain belong to the
group.
By default, the Everyone group does not have any privileges. You can assign privileges, roles, and
permissions to the Everyone group to grant the same access to all users.
Operator Group
The Informatica domain includes a default group named Operator.
By default, the Operator group has permission on all of the objects in the domain. You can assign the
Operator role to the Operator group and use it to manage the Operator users in the domain.
Managing Groups
You can create, edit, and delete groups in the native security domain.
You can assign roles, permissions, and privileges to a group in the native or an LDAP security domain. You
cannot delete or modify the properties of group accounts in the LDAP security domains. The roles,
permissions, and privileges assigned to the group determines the tasks that users in the group can perform
within the Informatica domain.
You can assign roles, permissions, and privileges to a group. The roles, permissions, and privileges assigned
to the group determines the tasks that users in the group can perform within the Informatica domain.
You can assign roles, permissions, and privileges to a group. The roles, permissions, and privileges assigned
to the group determines the tasks that users in the group can perform within the Informatica domain.
Groups 43
Chapter 7
Privileges
Privileges determine the actions that users can perform in application clients. Informatica includes the
following privileges:
• Analyst Service privilege. Determines actions that users can perform using Informatica Analyst.
• Content Management Service privilege. Determines actions that users can perform using reference tables
in the Informatica Developer tool and the Informatica Analyst tool.
• Data Integration Service privilege. Determines actions on applications that users can perform using the
Administrator tool and the infacmd command line program. This privilege also determines whether users
can drill down and export profile results.
• Model Repository Service privilege. Determines actions on projects that users can perform using
Informatica Analyst and Informatica Developer.
Privileges determine the actions that users can perform in application clients. Informatica includes domain
privileges that determine actions that users can perform using the Administrator tool.
You assign privileges to users and groups for application services. You can assign different privileges to a
user for each application service of the same service type.
You assign privileges to users and groups on the Security tab of the Administrator tool.
The Administrator tool organizes privileges into levels. A privilege is listed below the privilege that it includes.
Some privileges include other privileges. When you assign a privilege to users and groups, the Administrator
tool also assigns any included privileges.
Privilege Groups
The domain and application service privileges are organized into privilege groups. A privilege group is an
organization of privileges that define common user actions. For example, the domain privileges include the
following privilege groups:
44
• Domain Administration. Includes privileges to manage the domain, folders, nodes, grids, licenses, and
application services.
• Domain Administration. Includes privileges to manage the domain, folders, and application services.
• Security Administration. Includes privileges to manage users, groups, roles, and privileges.
• Domain Administration. Includes privileges to manage the domain, folders, nodes, grids, licenses, and
application services.
• Tools. Includes privileges to log in to the Administrator tool.
• Monitoring. Includes privileges to monitor Ultra Messaging deployments and view statistics.
Tip: When you assign privileges to users and user groups, you can select a privilege group to assign all
privileges in the group.
Roles
A role is a collection of privileges that you assign to a user or group. Privileges determine the actions that
users can perform. You assign a role to users and groups for the domain and for application services in the
domain.
The Roles section of the Navigator organizes roles into the following folders:
• System-defined Roles. Contains roles that you cannot edit or delete. The Administrator role is a system-
defined role.
• Custom Roles. Contains roles that you can create, edit, and delete. The Administrator tool includes some
custom roles that you can edit and assign to users and groups.
When you select a folder in the Roles section of the Navigator, the contents panel displays all roles belonging
to the folder. Right-click a role and select Navigate to Item to display the role details in the contents panel.
When you select a role in the Navigator, the contents panel displays the following tabs:
• Overview. Displays general properties of the role and the users and groups that have the role assigned for
the domain and application services.
• Privileges. Displays the privileges assigned to the role for the domain and application services.
Roles 45
Content Management Service Privileges
The Content Management Service privileges determine actions that licensed users can perform on reference
tables.
The following table lists the privileges and permissions required to manage reference tables:
Create Write on project - Create a reference table in the Analyst and Developer tool.
Reference - Create a reference table with infacmd rtm import.
Tables - Import a reference table object to the Model repository.
- Copy a reference table in the Analyst and Developer tool.
- Create a reference table from profile data.
Note: The Create privilege also grants the Edit privilege by default.
Edit Reference Read on project - Edit reference table data values in the Developer tool and Analyst tool.
Table Data and - Add profile data to a reference table.
Metadata - Add or delete columns in a reference table. Change reference table metadata
such as column names, descriptions, and default values.
The Data Integration Service privileges determine actions that users can perform on applications using the
Administrator tool and the infacmd command line program. They also determine whether users can drill
down and export profile results using the Developer tool.
The following table lists the required permissions and the actions that users can perform with the privilege in
the Application Administration privilege group:
The Model Repository Service privileges determine actions that users can perform on projects using
Informatica Developer.
The Model repository object permissions determine the tasks that users can complete on objects in projects.
The following table lists the required permissions and the actions that users can perform with the Model
Repository Service privileges:
N/A Read on project User can view projects and objects in projects.
N/A Write on project User can create, edit, and delete objects in projects.
N/A Grant on project User can grant and revoke permissions on projects for users and groups.
Access Analyst N/A User can access the Model repository from the Analyst tool.
Access Developer N/A User can access the Model repository from the Developer tool.
Create, Edit, and Write on projects User can perform the following actions:
Delete Projects - Edit projects.
- Delete projects if the user created the projects.
- Upgrade the content of the Model Repository Service. To upgrade the
service from the Actions menu or from the command line, the user must
also have the Manage Service privilege for the domain and permission
on the Model Repository Service. To upgrade the service using the
service upgrade wizard, the user must also have the Administrator role
for the domain.
Manage Data N/A User can create, edit, and delete data domains in the data domain
Domains glossary. This privilege is part of the Data Domain Administration
privilege group.
Manage N/A User can configure scorecard notifications. This privilege is part of the
Notifications Profiling Administration privilege group.
Manage Team- N/A User can manage the locked or unlocked states of Model repository
based Development objects. If the Model repository is integrated with a version control
system, the user can manage the checked out or checked in states of
objects. The user can also manage the ownership of checked-out objects.
N/A Read on project User can view projects and objects in projects.
N/A Write on project User can create, edit, and delete objects in projects.
N/A Grant on project User can grant and revoke permissions on projects for users and groups.
Access Developer N/A User can access the Model repository from the Developer tool.
Create, Edit, and Delete N/A User can perform the following actions:
Projects - Create projects.
- Upgrade the Model Repository Service.
Create, Edit, and Delete Write on project User can perform the following actions:
Projects - Edit projects.
- Delete projects if the user created the projects.
Show Security Details N/A User can view the following details:
- Names of projects for which users do not have read permission.
- Error and warning message details.
Catalog Management: Catalog View Users can perform the following actions:
- View custom attributes
- Search data assets
- Filter data assets using search filters
- View data asset overview
- View data asset lineage
- View data asset relationships
Catalog Management: Catalog Edit Users can perform the following actions:
- Edit custom attributes
- Configure search filters
- View search filters
Catalog Management: Domain Creation Users can perform the following actions:
- Create data domains
- Update data domain
- View data domains
- Delete data domain
Catalog Management: Domain Curation Users can perform the following actions:
- View data domains
- Accept or reject data domains
Resource Management: Admin - View Users can perform the following actions:
Resource - View resource
- View schedule
Resource Management: Admin - Edit Users can perform the following actions:
Profiling - View resource
- View schedule
- Update profile settings
- Create global profiling configuration
- Update global profiling configuration
- Delete global profiling configuration
- View global profiling configuration
Resource Management: Admin - Edit Users can perform the following actions:
Resource - Create resource
- Update resource
- View resource
- Delete resource
- Purge resource
- Edit profiling settings
- Create schedule
- Update schedule
- Delete schedule
- View schedule
- Assign schedule to resource
- Purge schedule
- Assign connection
- Unassign connection
Domain Management: Admin - View Users can perform the following actions:
Domain and Domaingroup - View data domain and data domain group
Domain Management: Admin - Edit Users can perform the following actions:
Domain and Domaingroup - Create data domains and data domain groups
- Update data domain and data domain group
- View data domains and data domain group
- Delete data domain and data domain group
Data Privileges: View Data Users can perform the following actions:
- View the value frequency results in Enterprise Data Catalog
Data Privileges: View Sensitive Data Users can perform the following actions:
- View the value frequency results for an asset that contains sensitive data
The following table lists the required privilege and the action that users can perform with the privilege in the
API Privileges group:
REST API Privilege Users can perform Enterprise Data Catalog functions using REST APIs.
Managing Roles
A role is a collection of privileges that you can assign to users and groups. You can assign the following
types of roles:
A role includes privileges for the domain or an application service type. You assign roles to users or groups
for the domain or for each application service in the domain.
A role includes privileges for the domain or an application service type. You assign roles to users or groups
for the domain or for each application service in the domain.
• Administrator. This is a system-defined role that has privileges to administer the Administrator tool. With
this role, you can create and manage user accounts, create the Ultra Messaging Service and configure it,
configure UMSM components, and UM deployments.
• Operator. This is a custom role that has privileges to monitor UM deployments.
When you select a role in the Roles section of the Navigator, you can view all users and groups that have
been directly assigned the role for the domain and application services. You can view the role assignments
by users and groups or by services. To navigate to a user or group listed in the Assignments section, right-
click the user or group and select Navigate to Item.
System-Defined Roles
A system-defined role is a role that you cannot edit or delete. The Administrator role is a system-defined role.
When you assign the Administrator role to a user or group for the domain, Analyst Service, Data Integration
Service, or Model Repository Service, the user or group is granted all privileges for the service. The
Administrator role bypasses permission checking. Users with the Administrator role can access all objects
managed by the service.
Administrator Role
When you assign the Administrator role to a user or group for the domain or the Data Integration Service, the
user or group can complete some tasks that are determined by the Administrator role, not by privileges or
permissions.
You can assign a user or group all privileges for the domain or the Data Integration Service and then grant the
user or group full permissions on all domains. However, this user or group cannot complete the tasks
determined by the Administrator role.
For example, a user assigned the Administrator role for the domain can configure domain properties in the
Administrator tool. A user assigned all domain privileges and permission on the domain cannot configure
domain properties.
The following table lists the tasks determined by the Administrator role for the domain or the Data Integration
Service:
Service Tasks
Data Integration Service - Upgrade the Data Integration Service using the Actions menu.
Managing Roles 51
Custom Roles
A custom role is a role that you can edit or delete.
You can edit the privileges for these roles, or delete the roles. You can also create your own custom roles.
• Privileges. A privilege determines the actions that users can perform in application clients.
• Roles. A role is a collection of privileges. When you assign a role to a user or group, you assign the
collection of privileges belonging to the role.
Use the following rules and guidelines when you assign privileges and roles to users and groups:
• You assign privileges and roles to users and groups for the domain and for each application service that
is running in the domain.
• You can assign different privileges and roles to a user or group for each application service of the same
service type.
• A role can include privileges for the domain and multiple application service types. When you assign the
role to a user or group for one application service, privileges for that application service type are assigned
to the user or group.
If you change the privileges or roles assigned to a user, the changed privileges or roles take effect the next
time that the user logs in.
Note: You cannot edit the privileges or roles assigned to the default Administrator user account.
Inherited Privileges
A user or group can inherit privileges from the following objects:
• Group. When you assign privileges to a group, all subgroups and users belonging to the group inherit the
privileges.
• Role. When you assign a role to a user, the user inherits the privileges belonging to the role. When you
assign a role to a group, the group and all subgroups and users belonging to the group inherit the
privileges belonging to the role. The subgroups and users do not inherit the role.
You cannot revoke privileges inherited from a group or role. You can assign additional privileges to a user or
group that are not inherited from a group or role.
The Privileges tab for a user or group displays all the roles and privileges assigned to the user or group for
the domain and for each application service. Expand the domain or application service to view the roles and
privileges assigned for the domain or service. Click the following items to display additional information
about the assigned roles and privileges:
• Name of an assigned role. Displays the role details on the details panel.
• Information icon for an assigned role. Highlights all privileges inherited with that role.
Privileges that are inherited from a role or group display an inheritance icon. The tooltip for an inherited
privilege displays which role or group the user inherited the privilege from.
Permissions Overview
You manage user security with privileges and permissions. Permissions define the level of access that users
and groups have to an object.
Even if a user has the privilege to perform certain actions, the user may also require permission to perform
the action on a particular object.
Connection Administrator tool You can assign permissions on connections defined in the
objects Analyst tool Administrator tool, Analyst tool, or Developer tool. These tools
share the connection permissions.
Developer tool
Enterprise Information
Catalog
Domain objects Administrator tool You can assign permissions on the following domain objects:
domain, folders, nodes, grids, licenses, application services, and
operating system profiles.
Model repository Analyst tool You can assign permissions on projects defined in the Analyst tool
projects Developer tool and Developer tool. These tools share project permissions.
Types of Permissions
Users and groups can have the following types of permissions in a domain:
Direct permissions
Permissions that are assigned directly to a user or group. When users and groups have permission on an
object, they can perform administrative tasks on that object if they also have the appropriate privilege.
You can edit direct permissions.
Inherited permissions
Permissions that users inherit. When users have permission on a domain or a folder, they inherit
permission on all objects in the domain or the folder. When groups have permission on a domain object,
all subgroups and users belonging to the group inherit permission on the domain object. For example, a
domain has a folder named Nodes that contains multiple nodes. If you assign a group permission on the
folder, all subgroups and users belonging to the group inherit permission on the folder and on all nodes
in the folder.
53
Permissions that users inherit. When users have permission on a domain, they inherit permission on all
objects in the domain. When groups have permission on a domain object, all subgroups and users
belonging to the group inherit permission on the domain object.
Permissions that users inherit. When users have permission on a domain, they inherit permission on all
objects in the domain. When groups have permission on a domain object, all subgroups and users
belonging to the group inherit permission on the domain object.
You cannot revoke inherited permissions. You also cannot revoke permissions from users or groups
assigned the Administrator role. The Administrator role bypasses permission checking. Users with the
Administrator role can access all objects.
You can deny inherited permissions on some object types. When you deny permissions, you configure
exceptions to the permissions that users and groups might already have.
Effective permissions
Superset of all permissions for a user or group. Includes direct permissions and inherited permissions.
When you view permission details, you can view the origin of effective permissions. Permission details
display direct permissions assigned to the user or group, direct permissions assigned to parent groups, and
permissions inherited from parent objects. In addition, permission details display whether the user or group
is assigned the Administrator role which bypasses permission checking.
When you manage permissions for a user or group, you can use the following search filters:
Security domain
Pattern string
Enter a string to search for users or groups. The Administrator tool returns all names that contain the
search string. The string is not case sensitive. For example, the string "DA" can return "iasdaemon," "daph
ne," and "DA_AdminGroup."
You can also sort the list of users or groups. Right-click a column name to sort the column in ascending or
descending order.
For example, if a user has permission on a node, but does not have the Manage Nodes and Grids privilege,
the user can view the node properties, but cannot configure, shut down, or remove the node.
Domain Enables Administrator tool users to access all objects in the domain. When users have permission
on a domain, they inherit permission on all objects in the domain.
Folder Enables Administrator tool users to access all objects in the folder in the Administrator tool. When
users have permission on a folder, they inherit permission on all objects in the folder.
Node Enables Administrator tool users to view and edit the node properties. Without permission, a user
cannot use the node when defining an application service or creating a grid.
Grid Enables Administrator tool users to view and edit the grid properties. Without permission, a user
cannot assign the grid to a Data Integration Service.
License Enables Administrator tool users to view and edit the license properties. Without permission, a
user cannot use the license when creating an application service.
Application Enables Administrator tool users to view and edit the application service properties.
Service
Domain Enables Administrator tool users to access all objects in the domain. When users have
permission on a domain, they inherit permission on all objects in the domain.
Node Enables Administrator tool users to view and edit the node properties.
Application Service Enables Administrator tool users to view and edit the application service properties.
License Enables Administrator tool users to view and edit the license properties.
Domain Enables Administrator tool users to access all objects in the domain. When users have
permission on a domain, they inherit permission on all objects in the domain.
Node Enables Administrator tool users to view and edit the node properties.
Application Service Enables Administrator tool users to view and edit the application service properties.
License Enables Administrator tool users to view and edit the license properties.
You can use the following methods to manage domain object permissions:
• Manage permissions by domain object. Use the Permissions view of a domain object to assign and edit
permissions on the object for multiple users or groups.
• Manage permissions by user or group. Use the Manage Permissions dialog box to assign and edit
permissions on domain objects for a specific user or group.
A default administrator
description 40
Administrator modifying 40
role 51 passwords, changing 40
Administrator role 51 dependent services
administrators overview 26
application client 41 direct permission
default 40 description 53
domain 40 domain
application services administrator 40
Content Management Service 37 Administrator role 51
dependencies 26 user security 18
overview 11 domain administrator
permissions 54 description 40
prerequisites 25 domain objects
authentication permissions 54
LDAP 20 domain permissions
native 20 direct 53
effective 53
inherited 53
C domains
application services 11
Catalog Service configuring 21
creating 33
dependent service 26
overview 14
privileges 48
E
code page compatibility Edit Reference Table Metadata
application services 21 privilege 46
locale 21 effective permission
configuration description 53
domains 21 email notification
environment variables 22 overview 36
environment variables on Linux 24 process 36
Content Management Service Enterprise Data Catalog
creating 37 services 11
dependent service 26 environment variables
overview 14 configuring 22
privileges 46 configuring on Linux 24
rule specifications 14 LANG 21
Create Reference Tables LANG_C 21
privilege 46 LC_ALL 21
custom roles LC_CTYPE 21
assigning to users and groups 52 library paths on Linux 24
description 50, 52 Linux 22
locale 21
Everyone group
D description 42
57
G M
grids Model Repository Service
permissions 54 after creating 29
groups configuring 27
default Everyone 42 creating 27
managing 43 overview 14
overview 42 privileges 47
privileges, assigning 52
roles, assigning 52
N
H native authentication
description 20
host file native groups
Data Integration Service 33 managing 43
native security domain
description 20
I native users
managing 41
InfaHadoop Service nodes
overview 14 application services 11
Informatica Analyst permissions 54
administrator 41
Informatica Developer
administrator 41
Informatica domain
O
permissions 18 operating system profiles
privileges 18 permissions 54
user security 18 overview
users, managing 41 Content Management Service 14
inherited permission
description 53
inherited privileges
description 52
P
passwords
changing for default administrator 40
L permissions
application services 54
LANG description 53
environment variables 21 direct 53
LC_ALL domain objects 54
environment variables 21 effective 53
LC_CTYPE folders 54
environment variables 21 grids 54
LDAP authentication inherited 53
description 20 licenses 54
LDAP groups nodes 54
managing 43 operating system profiles 54
LDAP security domain search filters 54
description 20 types 53
LDAP security domains working with privileges 53
description 20 prerequisites
LDAP users application services 25
managing 41 privilege groups
licenses description 44
permissions 54 privileges
Linux assigning 52
environment variables 22 Catalog Service 48
library paths 24 Content Management Service 46
locale environment variables Data Integration Service 46
configuring 21 description 44
localhost inherited 52
Data Integration Service 33 Model Repository Service 47
working with permissions 53
58 Index
R security domains (continued)
native 20
roles services
Administrator 51 application services 11
assigning 52 system-defined roles
custom 52 Administrator 51
managing 50 assigning to users and groups 52
overview 45 description 50
rule specifications
Content Management Service 14
U
S user accounts
created during installation 40
search filters default 40
permissions 54 overview 40
security users
permissions 18 managing 41
privileges 18, 44 overview 39
security domains privileges, assigning 52
LDAP 20 roles, assigning 52
Index 59