Beruflich Dokumente
Kultur Dokumente
Administrator Guide
Table of Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Informatica Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Informatica Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Informatica Cloud Web Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Informatica Cloud Communities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Informatica Cloud Marketplace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Informatica Cloud Connector Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Informatica Knowledge Base. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Informatica Cloud Trust Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Informatica Global Customer Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Table of Contents
Table of Contents
Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
User Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Configuring a User. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Viewing User Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Deleting a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Audit Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
User Configuration Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Table of Contents
Preface
Welcome to Informatica Cloud, Informaticas hosted applications. Informatica Cloud uses functionality from
PowerCenter and Informatica Data Quality to provide easy-to-use, web-based applications.
The Informatica Cloud Administrator Guide explains how administrators can set up and maintain Informatica
Cloud organizations.
Informatica Resources
Informatica Documentation
The Informatica Documentation team makes every effort to create accurate, usable documentation. If you
have questions, comments, or ideas about this documentation, contact the Informatica Documentation team
through email at infa_documentation@informatica.com. We will use your feedback to improve our
documentation. Let us know if we can contact you regarding your comments.
The Documentation team updates documentation as needed. To get the latest documentation for your
product, navigate to Product Documentation from http://mysupport.informatica.com.
https://community.informatica.com/community/marketplace/informatica_cloud_mall
Preface
CHAPTER 1
Informatica Administrator, 11
Object migration
By default, the user who creates an Informatica Cloud organization is the organization administrator. The
organization administrator is the Informatica Cloud user responsible for managing the organization. If an
organization has multiple administrators, the organization administrator is considered the lead administrator.
By default, all users assigned the Admin role, which includes the organization administrator, have full access
to the entire organization.
Informatica Cloud
A browser-based application that runs at the Informatica Cloud hosting facility. It provides the ability to
configure connections, create users, and create, run, schedule, and monitor tasks.
Informatica Cloud hosting facility
A facility where the Informatica Cloud application runs. The Informatica Cloud hosting facility stores all
task and organization information.
Informatica Cloud applications
Applications used to perform tasks such as data synchronization, contact validation, and data replication.
Informatica Cloud Secure Agent
A component of Informatica Cloud installed on a local machine that runs all tasks and provides firewall
access between the hosting facility and your organization. When the Secure Agent runs a task, it
connects to the Informatica Cloud hosting facility to access task information, connects directly and
securely to sources and targets, transfers data between sources and targets, and performs any
additional task requirements.
10
Monitor. View details about tasks that are running or complete. Access the Service and Process Monitor.
Design. Design task flows, bundles, integration templates, and mappings. Access the Service and
Process Designer.
Configure. Configure Informatica Cloud components, such as Secure Agents, connections, and saved
queries. And download bundles and Informatica Cloud Connectors.
Administer. Perform tasks to administer the organization, such as organization properties configuration
and object migration.
Click the Help icon on the sidebar to access help about the page that is currently in view.
When you log in to Informatica Cloud, the Informatica Cloud Messages page might appear to tell you about
upcoming maintenance.
On the Informatica Cloud Login page, enter your user name and password. Your user name is typically
your email address.
2.
When you log in to Informatica Cloud for the first time, you might need to configure a security question.
Informatica Cloud uses the security question to verify your identity if you forget your password.
Informatica Administrator
If you have access to the Informatica Administrator tool, you can use it to view Informatica Cloud organization
properties. You cannot make any changes to the properties using the Administrator tool.
For more information about the Administrator tool, see the Informatica Administrator Guide.
Create the organization and organization hierarchy and configure organization properties.
11
12
CHAPTER 2
Organization Administration
This chapter includes the following topics:
Organization Creation, 13
Organization Properties, 14
Organization Hierarchies, 16
License Management, 17
Organization Creation
You can create an organization on the Informatica Cloud website.
When you sign up for an organization with Informatica Cloud, Informatica Cloud creates an organization
administrator account with your email address as the user name and generates a temporary password. As an
organization administrator, you are assigned the Admin role, which has full access to the organization.
13
Informatica Cloud sends your user name, password, and Informatica Cloud URL to your email address. When
you log in to Informatica Cloud for the first time, click Login with Temporary Password in the email, or enter
the user name and password provided in the email.
Creating an Organization
You can sign up for a trial version of Informatica Cloud on the Informatica Cloud website, which will create an
organization. After you receive the trial version, you can click Buy Now to subscribe to an Informatica Cloud
edition.
1.
Go to http://www.informatica.com and click the link to start a trial version of Informatica Cloud, and then
enter the information on the form.
Informatica Cloud sends you a temporary password and a link to Informatica Cloud.
2.
To sign up for the full version, log in to Informatica Cloud and then in the Informatica Cloud sidebar, click
Buy Now.
Organization Properties
Configure properties for your organization and sub-organizations on the My Organization page.
You can configure the following properties:
Authentication properties
14
Password restrictions, such as the minimum number of characters and the minimum character mix
allowed in a valid password, password reuse, and password expiration.
Password Restrictions
Configure the following password restrictions for all users in the organization:
Password length
Specify a number between 4 and 12 characters for the minimum length allowed for a valid password.
Password expiration
Specify whether passwords expire. If you specify that passwords expire, then specify the number of days
until the password expires.
Minimum number of characters
Specify the minimum number of characters allowed in a valid password.
Minimum character mix
Specify the number of character sets required in valid passwords. Passwords can contain a mix of the
following character sets:
Numeric characters
Special characters
For example, if you set the Minimum Character Mix Option to 1, then passwords must contain at least
one of the character sets. If you set the Minimum Character Mix Option to 2, then passwords must
contain at least two of the character sets.
Two-Factor Authentication
Two-factor authentication uses trusted IP address ranges in addition to account passwords to enhance
Informatica Cloud security. Configure the Two-Factor Authentication organization property when you want to
increase security for your organization.
When you configure two-factor authentication, you enter one or more trusted IP address ranges. A user with
a valid login must have an IP address within the trusted IP address ranges to connect to your organization.
Informatica Cloud supports IP address formats in IP version 4 (IPv4) and version 6 (IPv6).
Organization Properties
15
Note: If you enter an invalid IP address range, users cannot access your organization. Contact your network
administrator for valid IP address ranges.
Organization Hierarchies
An organization hierarchy is a hierarchy of related organizations that includes a parent organization and one
or more sub-organizations. The administrator for a parent organization can create an organization hierarchy
and manage sub-organization licenses. To create a sub-organization, the parent organization must have the
Org Hierarchy license.
An example of an organization hierarchy in practice is the use of sub-organizations for development, test,
and production environments. You can use a sub-organization to develop tasks, a sub-organization to test
the tasks, and another sub-organization to run the tasks. You can migrate the task objects from one suborganization to another sub-organization. Another example is to create an organization hierarchy to reflect
different groups of users, where you create a sub-organization for each group.
An organization hierarchy can include a limited number of sub-organizations. The Maximum SubOrganizations organization property states the maximum number of sub-organizations that are allowed for
your organization. To increase the number of sub-organizations allowed for your organization, contact
Informatica Global Customer Support.
16
A sub-organization cannot be a parent to any organizations or be a part of any other organization hierarchy.
You can add a sub-organization to the hierarchy in the following ways:
Create a sub-organization.
Link an existing organization. In the organization hierarchy, the organization that you link to becomes a
sub-organization, and the organization you link from becomes the parent organization.
Creating a Sub-organization
The administrator of the parent organization can create a sub-organization.
1.
Log in to the parent organization and then click Administer > Sub-organizations.
2.
3.
To enable user access, create user accounts and configure organization properties.
Linking Organizations
You can link an organization if all of the following conditions apply:
You are the administrator of the parent organization with the Org Hierarchy license.
Log in to the organization that you want to be the parent organization and click Administer > Suborganizations.
2.
3.
In the Informatica Cloud Login dialog box, enter the user name and password that you use to log in to
the organization that you want to set up as a sub-organization.
4.
Click OK.
5.
In the upper right corner of the Informatica Cloud application, select the organization you want to view.
License Management
Licenses determine the Informatica Cloud subscription level for the organization and provide access to
Informatica Cloud applications, features, connectors, and bundles.
As an administrator, you review licenses set up for your company, monitor job activities to see how usage
aligns with your license subscription, and manage license expiration.
License Management
17
License Types
When you create an Informatica Cloud organization, Informatica Cloud assigns the organization a license
type for each application.
Informatica Cloud uses the following types of licenses:
Trial
You can use the application free of charge for a 30-day period. At the end of the trial period, you can
subscribe to the application. A trial subscription might provide limited access to the features of the data
application.
Subscription
You can use the application for the duration of the contract period. Near the end of the contract period,
Informatica Cloud indicates that the contract is about to expire. Renew the contract to continue to use
the application.
Free subscription
You can use the Data Synchronization application free of charge. A free subscription might provide
limited access to the features of the Data Synchronization application.
License Categories
Informatica Cloud licenses are categorized by application, feature, and functionality.
The following license categories are available:
Application license
Application licenses provide access to Informatica Cloud applications such as Data Synchronization,
Contact Validation, Data Replication, and Mapping Configuration.
Feature license
Feature licenses provide access to features such as fine-grained security, object migration, and
Salesforce connectivity.
Organization hierarchy license
Use the organization hierarchy license to create a specified number of sub-organizations under the
parent organization.
Connector license
Connector licenses provide connections to entities such as Amazon Redshift, NetSuite, and JDBC.
Bundle license
Bundle licenses provide access to a set of objects that improve developer productivity and enhance the
overall quality of data conversion and data integration projects.
Package license
Package licenses provide access to packages such as the Financial Data and Data Standardization Data
Quality packages.
18
Sub-organization Licenses
A sub-organization can be assigned licenses that are assigned to the parent organization and have licenses
or subscriptions maintained by the parent organization.
When you add a sub-organization, the sub-organization inherits all licenses and subscription options of the
parent with the following exceptions:
A sub-organization does not inherit bundle licenses. To use a bundle in the sub-organization, a user must
install the bundle.
If you link a sub-organization that has a license that the parent organization does not have, then the suborganization loses the license.
After you create or link a sub-organization, you can edit the licenses of the sub-organization.
Note: You cannot edit the job limit of a sub-organization's license.
2.
Under Actions, click on the key icon next to the sub-organization you want to edit.
3.
4.
5.
10,000 rows each day for each application, and 300,000 rows each month for each application
25 jobs each day for each application, and 250 jobs each month for each application
To view the number of processed rows and jobs that your organization has run, select Administer >
Licenses.
License Management
19
License Expiration
When a license expires, you cannot access the application or features associated with the license and
scheduled jobs associated with the license are disabled.
After you extend the license and enable the license, you can access the application or features and the
scheduled jobs resume processing. If all licenses for the organization expire, you cannot log in to Informatica
Cloud.
Sub-organization licenses must expire at the same time or before the parent organization licenses expire. If
the parent organization license is disabled or set to expire at an earlier date, you must align these changes
for the sub-organization. Edit the sub-organization licenses to confirm the changes.
You can review the expiration date for licenses. To extend a license, contact Informatica Global Customer
Support.
20
CHAPTER 3
Secure Agents
This chapter includes the following topics:
2.
3.
21
Runtime Environments
A runtime environment is an environment that you configure to access connections and to run tasks. You can
assign one or more Secure Agents to a runtime environment.
By default, a Secure Agent is assigned to its own runtime environment. If you have the Secure Agent Cluster
license, you can add more than one Secure Agent to a runtime environment.
You can create runtime environments to serve different functions. For example, you create a production
runtime environment and a test runtime environment. You configure connections in the production runtime
environment to the production organization in Salesforce and the production databases. You configure
connections in the test runtime environment to the sandbox organization in Salesforce and the test
databases. You test changes to mappings in the test runtime environment to ensure they run properly before
deploying the changes to the production runtime environment.
A runtime environment with more than one Secure Agent can increase scalability and flexibility, because
tasks can run if one of the Secure Agents is available. In addition, when you add or delete Secure Agents to
a runtime environment with other Secure Agents, you do not have to edit associated connections or tasks.
If you assign more than one Secure Agent to a runtime environment, then all the Secure Agents must be
functionally the same. Verify that the installation directory and directory paths are the same on each Secure
Agent machine in the runtime environment. Ensure that all Secure Agents assigned to a particular runtime
environment are configured and enabled to connect to the same external systems, which includes access to
the files needed for connections, such as libraries, initialization files, and JAR files. If files are used as part of
data integration tasks, ensure the files are available in a shared file system location.
When you start a task in a runtime environment with more than one Secure Agent, one of the Secure Agents
runs the task. After a task is complete, to see which Secure Agent ran the task, go to Monitor > Activity Log
and click on the task name. You might need to access the local machine with the Secure Agent that ran the
task to see success files and error files for certain connections.
Description
Use one of the following operating systems:
- Microsoft Windows versions:
- Windows 7 (32-bit or 64-bit)
- Windows XP Pro SP2 or SP3 (32-bit)
- Windows 2008 R2 (32-bit or 64-bit)
- Linux (32-bit or 64-bit) with the following configuration:
- Red Hat Enterprise Linux version 6.x and above
- SUSE Linux Enterprise version 11.0 and above
Disk Space
500 MB.
Internet Access
Access to the web server that runs the Informatica Cloud application.
Connectivity
For more information about Secure Agent requirements, contact Informatica Global Customer Support.
22
Ensure the machine on which you run the Secure Agent meets the minimum requirements.
2.
3.
Click Configure > Runtime Environments, and then click Download Secure Agent.
2.
Select the operating system on which you will run the Secure Agent, and then click Download.
3.
Save the installation wizard to the machine where you want to run the Secure Agent.
The name of the Windows Secure Agent installation file is agent_install.exe. The name of the Linux
Secure Agent installation file is agent_install.bin.
23
Open the directory where you downloaded agent_install.exe, and double-click the file.
2.
3.
4.
5.
Enter your Informatica Cloud user name and password and click Register.
The Secure Agent starts.
The Informatica Cloud Secure Agent window displays the status of the Secure Agent. You can restart,
stop, and configure the Secure Agent proxy in this window. You can close the window at any time. The
Secure Agent continues to run as a service until stopped.
6.
To launch the Secure Agent Manager, click Start > All Programs > Informatica Cloud Secure Agent >
Informatica Cloud Secure Agent.
If the Secure Agent Manager is active, you can click the Informatica Cloud icon in the Windows taskbar
notification area to open the Secure Agent Manager.
The Secure Agent Manager displays the Secure Agent status.
24
2.
3.
4.
Required/
Description
Optional
5.
Proxy Host
Required
Host name of the outgoing proxy server that the Secure Agent uses.
Proxy Port
Required
User Name
Optional
Password
Optional
Click OK.
The Secure Agent Manager restarts the Secure Agent to apply the new settings.
From the Windows Control Panel, click Administrative Tools > Services.
2.
In the Services window, right-click the Informatica Cloud Secure Agent service and click Properties.
3.
4.
5.
6.
Click OK.
7.
In the Services window, restart the Secure Agent service for the changes to take effect.
25
Click Start > All Programs > Informatica Cloud Secure Agent > Uninstall Informatica Cloud Secure
Agent.
The Secure Agent uninstaller launches.
2.
Click Uninstall.
3.
4.
Ensure the machine on which you run the Secure Agent meets the minimum requirements.
2.
3.
Click Configure > Runtime Environments, and then click Download Secure Agent.
2.
Select the operating system on which you will run the Secure Agent, and then click Download.
3.
Save the installation wizard to the machine where you want to run the Secure Agent.
The name of the Linux Secure Agent installation file is agent_install.bin.
26
In a shell command line, navigate to the directory where you downloaded the file and enter the following
command:
agent_install.bin i console
The installer completes.
2.
To start the Secure Agent, navigate to the directory where you installed the Secure Agent and enter the
following command:
infaagent startup
After the Secure Agent starts, register the Secure Agent.
3.
4.
Enter the following command using your Informatica Cloud username and password:
<SecureAgent_InstallDirectory>/main/agentcore
consoleAgentManager.sh
You can check the registration status of a Secure Agent using the following command in the same
directory:
consoleAgentManager.sh
isConfigured
2.
Description
InfaAgent.ProxyHost
Host name of the outgoing proxy server that the Secure Agent uses.
InfaAgent.ProxyPort
27
Field
Description
InfaAgent.ProxyUser
InfaAgent.ProxyPassword
3.
4.
2.
3.
Enter the following command in the command line to stop the Secure Agent Linux process:
4.
To uninstall the Secure Agent, run rm -rf on the directory where you installed the Secure Agent to
remove Secure Agent files.
infaagent shutdown
28
Description
resource-releasewaiting-time
Number of seconds that the Secure Agent Core waits for the Secure Agent
Manager to exit.
tomcat-notificationperiod
Number of seconds that the Secure Agent Core waits for the Apache Tomcat
process to notify the Secure Agent Core that it is ready.
Description
upgrade-check-period
Number of seconds that the Secure Agent Core checks for upgrade from the
server. The minimum value that you can enter is 30 seconds.
maintenance-checkperiod
Number of seconds that the Secure Agent Core waits to perform maintenance
checks.
waiting-time-fortomcat-shutdown
Number of seconds that the Secure Agent Core waits for the Apache Tomcat
process to shut down before aborting it.
rmi-info-refresh-period
Number of seconds that the Secure Agent Core waits to refresh the Java RMI
information.
tomcat-check-period
Number of seconds that the Secure Agent Core waits to check if the Apache
Tomcat process is running. Secure Agent Core starts the Apache Tomcat process
if it is supposed to be running.
waiting-time-for-jobscomplete
Number of seconds that the Apache Tomcat process waits for jobs to complete
before shutting down to upgrade the Secure Agent.
Description
start_as_windows_service
DTM
The following table describes the ETL engine properties that you can configure:
DTM Property
Description
AgentConnectionTimeout
SalesForceConnectionTimeout
Note: Configure other DTM properties only when Informatica Global Customer Support instructs you to.
29
Description
JRE_OPTS
INFA_MEMORY
The JRE VM options that are set for virtual machine memory for the Apache
Tomcat process.
INFA_SSL
Description
JRE_OPTS
Apache Tomcat
Configure the Apache Tomcat properties only when Informatica Global Customer Support instructs you
to.
Secure Agent Core Log4J
Configure the Secure Agent Core Log4J logging properties only when Informatica Global Customer
Support instructs you to.
Apache Tomcat Log4J
Configure the Apache Tomcat Log4J logging properties only when Informatica Global Customer Support
instructs you to.
Secure Agent Manager Log4J
Configure the Secure Agent Manager Log4J logging properties only when Informatica Global Customer
Support instructs you to.
2.
On the Runtime Environments page, if necessary, expand the runtime environments to see the list of
Secure Agents. Click the Secure Agent name from the list.
3.
Click Edit on the View Secure Agents page or select Edit Secure Agent under Actions.
The Edit Secure Agent page appears.
4.
If you want to change the Secure Agent name, in Agent Name, enter the new name.
5.
To edit a Secure Agent configuration property, in the Type list, select the type.
The properties associated with the type appear.
30
6.
To edit a property value, click the Edit Agent Configuration icon next to the property that you want to
edit.
7.
To reset the property to the system default, click the Reset Agent Configuration to system default
icon.
You can configure properties for the following configuration types:
8.
9.
Agent Core
Agent Manager
DTM
b.
c.
Click the Add icon or the Delete icon to add or delete properties.
10.
To reset all the configuration properties to the default settings, click Reset All.
11.
2.
Click the name of the Secure Agent that you want to view.
The View Secure Agent page displays Secure Agent details and version. It also displays the Secure
Agent package and configuration details.
3.
2.
getstatus
31
3.
To refresh the status of the Secure Agent, you can repeat Step 2, or you can run the following command:
consoleAgentManager.sh
updatestatus
You might need to use the updatestatus command if you have intermittent connectivity with the Secure
Agent.
2.
On the Runtime Environments page, click the name of the Secure Agent. If necessary, expand the
runtime environments to see the list of Secure Agents.
3.
4.
Use the Rows per Page option to change the number of rows that display on each page.
2.
If you want to assign Secure Agents to a runtime environment, ensure that the Secure Agents are
currently unassigned.
Secure Agents can only be assigned to one runtime environment.
3.
Under Actions for the runtime environment you want to configure, select Add or Remove Secure
Agents.
The Add or Remove Secure Agents window appears.
32
4.
Select the Secure Agents you want to assign to the runtime environment, or clear the Secure Agents you
want to unassign to the runtime environment.
If there is one Secure Agent in a runtime environment and the runtime environment is used in any
connections, you cannot unassign the Secure Agent. Configure the connection to use a different runtime
environment before unassigning the Secure Agent, or, if you have the Secure Agent Cluster license, add
a different Secure Agent to the runtime environment.
The machine that runs the Secure Agent must meet the minimum requirements.
You do not have to install the Secure Agent on the machine that you use to connect to Informatica Cloud.
For example, you might use machine A to connect to Informatica Cloud and Machine B to run the Secure
Agent.
If you install the Secure Agent on Linux, do not include spaces in the directory path. If you include spaces,
the Secure Agent installation may stop responding.
If you install the Secure Agent on Windows, the Windows user account that installed the Secure Agent
must have access to all remote directories that contain flat source or target files.
If you install the Secure Agent on Windows 2008, make sure the Microsoft Visual C++ 2008
Redistributable Package (x86) is installed on the machine.
You can run more than one Secure Agent, but run only one Secure Agent on each machine.
The Secure Agent must be running to run tasks. If the Secure Agent loses connectivity to Informatica
Cloud, it tries to reestablish connectivity to continue the task. If it cannot reestablish connectivity, the
Secure Agent becomes disabled and the task fails.
If an Informatica Cloud application shuts down for more than 12 hours, the Secure Agent connection to
the Informatica Cloud application times out. Manually restart the Secure Agent on each client machine.
You must uninstall the Secure Agent before you install another Secure Agent on the same machine.
To launch the Secure Agent Manager, click Start > All Programs > Informatica Cloud Secure Agent >
Informatica Cloud Secure Agent.
If the Secure Agent Manager is active, you can click the Informatica Cloud icon in the Windows taskbar
notification area to open the Secure Agent Manager.
The Secure Agent Manager displays the Secure Agent status.
2.
To stop the Secure Agent, click Stop. To restart the Secure Agent, click Restart.
33
The Secure Agent Manager displays a message when the action is complete.
3.
From the command line, navigate to the directory where you installed the Secure Agent.
2.
3.
You can view the Secure Agent status from Informatica Cloud or from a Linux command line.
2.
On the Runtime Environments page, under Actions, click Delete Secure Agent next to the Secure
Agent.
If the Secure Agent is running, a warning message appears. Stopping an active Secure Agent prevents
scheduled tasks associated with the Secure Agent from running. Ignore the warning if you do not need
the Secure Agent.
If you no longer need the Secure Agent, uninstall the Secure Agent.
34
CHAPTER 4
Roles, 36
User Groups, 37
Permissions, 39
Users, 42
35
Roles
A role determines a user's privileges and defines the general tasks that a user can perform. An organization
administrator must assign at least one role to each user.
Roles determine the functionality and Informatica Cloud menus that are available to a user. For example, to
access and perform any tasks on the Administer menu, you need the Admin role.
You can use the following roles in Informatica Cloud:
Admin
Designer
Service consumer
In addition to roles, user groups and object-level permissions can determine the ability of a user to view and
perform tasks on an object.
The following table describes the privileges for each role:
Privilege
Admin
Role
Designer
Role
Service Consumer
Yes
Yes
Yes
Yes
Yes
No
Yes
Yes
Yes
Yes
Yes
Yes
No
Yes
No
No
Admin Role
The Admin role has access to all Informatica Cloud functionality and can perform any task in the
organization.
The best practice is to assign the Admin role to one or two trusted users and assign the users to an
administrative user group that allows access to all objects and permissions. These users can act as
alternative organization administrators and can help troubleshoot access control and other issues that might
occur as you increase organization security.
36
Designer Role
The Designer role has limited access to Informatica Cloud functionality.
The Designer role has access to all available functionality on the Home, Monitor, Apps, Design, and
Configure menus. The Designer role can configure and test tasks, configure all related objects, and monitor
jobs. The Designer role does not have access rights to the Administer menu.
From the Apps menu, ability to view tasks, run tasks, download workflow XML, and create and reset
targets for data replication tasks.
From the Design menu, ability to run task flows and test run mappings.
The Service Consumer role does not have access rights to the following menus:
Monitor
Configure
Administer
User Groups
A user group is a collection of permissions for object types. If your organization has the Fine-Grained
Security license, you can create and manage user groups.
An organization administrator can create and assign user groups. The user group defines the types of objects
that a user can access, and the related tasks a user can perform.
Assign each user to at least one user group. Any user not assigned to a user group has limited access to
Informatica Cloud functionality, as users are restricted from any objects and permissions not included in their
user group. You can assign a user to more than one user group.
Important: To ensure that the organization administrator does not lose administrative privileges to
Informatica Cloud functionality, set up an administrative user group with access to all objects and assign the
organization administrator to the group. A best practice is to assign a few other administrators to this group
as well to serve as backup to the organization administrator.
The User Groups page displays a list of all user groups in the organization.
You can perform the following tasks for a user group:
User Groups
37
To create a user group, click Administer > User Groups, and then click New.
To edit a user group, click Administer > User Groups, click the user group you want to edit, and then
click Edit.
2.
On the New User Group page or Edit User Group page, configure the following details:
User Group
Field
Description
Name
Name of the user group. User group names are not case sensitive.
The user group name must be unique within the organization. User group names can
contain alphanumeric characters, spaces, and the following special characters:
_.+-
Description
3.
Select the permissions that you want to grant to the user group.
If you select a permission that requires Read permission, Read permission is automatically selected. For
example, to delete a connection you must be able to view the connection, so when you select Delete
permission, Read permission is also selected.
Permissions that are not relevant for the object type are disabled.
To select all permissions, click Check All. To clear all permissions, click Clear All.
4.
To add users to the group, you can move users from the Available Users list to the Selected Users list.
You can also add a user to the group individually when you edit the user.
5.
Click Administer > User Groups, and then click the name of the user group.
The View User Group page displays user groups details.
2.
38
1.
2.
On the User Group page, click the Delete icon next to the name of the user group.
Permissions
Permissions determine the access a user has at the object level. You can configure permissions for object
types at the user group-level or configure permissions for specific objects in object-level permissions.
The following list describes the types of permissions that you can configure:
Read
View objects and view details about each object. Use a connection or schedule in a task.
Create
Create objects. Download and install the Secure Agent.
Update
Edit objects. Requires read permission, which is automatically granted.
Delete
Delete objects. Requires read permission, which is automatically granted.
Run
Run tasks and task flows. Restart tasks from the activity log. Monitor jobs and stop jobs in the activity
monitor. Add tasks to a task flow if you have update permission on the task flow. Requires read
permission, which is automatically granted.
Change Permission
Configure permissions for individual objects of the selected type. Requires read permission, which is
automatically granted.
Permissions
39
The following image shows the Permissions area of the User Groups page.
These permissions control what is allowed in Informatica Cloud. They do not control operating system
permissions, such as the ability to start, stop, or configure the Secure Agent on Windows or Linux.
Object-Level Permissions
Object-level permissions define security for specific objects. If your organization has the Fine-Grained
Security license, you can create and manage object-level permissions.
An organization administrator can use object-level permissions to add or remove individual objects from the
user group domain.
By default, the user group defines the objects that a user can access. User group permissions are configured
by object type. Object-level permissions add additional or custom security for specific objects.
For example, you have a Developer user group that allows all users in the group to configure, delete, and run
all tasks. You also have a Scheduling user group that allows its users to configure schedules and task flows,
but not tasks. When a task no longer requires the Developer user group to edit it, you can edit task
permissions to secure the task and move it into production. Configure the task permissions to remove all
permissions for the Developer group. At the same time, you can grant the Scheduling group view and run
permissions.
40
2.
Click the Change Permission icon for the object. If the Change Permission icon is not available, click
the Edit icon, and then select Change Permissions.
The Change Permissions page displays the user groups in the organization.
If custom permissions have not been configured for the object, Default Permissions is selected, and the
Permissions table displays the permissions that each user group has for the object by default.
If custom permissions have already been configured for the object, the Custom Permissions option is
selected, and the Permissions table displays the custom permissions configured for each user group.
3.
4.
Configure the permissions that you want to allow for each user group.
To revert to the default permissions configured for all user groups, click Default Permissions.
5.
Click OK.
When implementing user groups, create an administrative user group with access to all objects. Assign
the organization administrator and backup administrators to the user group.
When implementing user groups, create a set of user groups to provide access to all necessary objects
and assign users to the user groups appropriately.
You can assign a user to more than one user group, but the best practice is to assign each user to a
single user group.
To edit an object, the user also needs read permission for all objects used within the object. For example,
when you assign a user the read and update permission for data synchronization tasks, verify that the
user also has read permission for the connections, saved queries, mapplets, and schedules to be used in
those tasks.
When a user edits a task, objects without read permission do not display. To avoid unexpected results,
the user should cancel all changes and avoid editing the task until you grant the appropriate read
permissions.
When configuring a task flow, a user needs run permission on tasks to be added to the task flow.
To edit a task flow, a user needs run permission for all tasks in the task flow. Without run permission on
all tasks, the user cannot save changes to the task flow.
To monitor jobs or to stop a running job, a user needs run permission for the task or task flow.
41
To migrate objects, the user account in both the source and target organizations should have the Admin
role with full access to the repository.
When adding a new license to an organization, Informatica Cloud does not grant permissions to user
groups. After receiving a new license, update user groups as necessary to allow access to new objects.
Users
A user is an Informatica Cloud user account that allows secure access to an organization. A user can perform
tasks in the organization based on the role and user group assigned to the user. Object-level permissions
can also affect the tasks a user can perform.
The Users page displays a list of all Informatica Cloud users in the organization.
You can perform the following tasks for a user:
Create a user.
Edit a user.
Delete a user.
User Properties
The organization administrator can configure users for the organization.
When you configure a user, you configure the following information:
User properties. Properties such as the user name, password, and maximum login retry attempts.
User details. Information about the user, such as the name, job title, and phone number of the user.
User security. Security options, such as the role, user group, and ability to preview data.
The role for a user defines the general tasks that the user can perform in the organization. The user group for
a user defines the objects the user can work with and the specific tasks that the user can perform. However,
if a user is assigned to a role with limited privileges, the user group cannot override these limitations. For
example, a user in the Service Consumer role is assigned to a user group that has run permissions on tasks.
Because the Service Consumer role limits the user's access to the activity monitor, the user cannot monitor
jobs.
42
Description
User Name
Informatica Cloud user name that identifies the user within the organization. Used to log
in to Informatica Cloud.
The user name must be a valid email address and unique within Informatica Cloud. For
example, john@abc.com.
User names can contain alphanumeric characters and the following special characters:
_.+You cannot modify a user name.
Salesforce User
Name
Confirm Salesforce
User Name
Password
Confirm Password
Maximum Login
Attempts
Maximum number of login attempts the user can make before the user is locked out.
Change Password on
Login
Determines if the user must reset the password after the user logs in.
Ignore License
Expiration Messages
If locked out, the user must contact Informatica Global Customer Support to reset the
account.
Select this option to require a user to create a new password after the user logs in.
Description
First Name
Last Name
Job Title
Phone Number
10-digit telephone number of the user. For example, (123) 456-7890, 123-456-7890, or
123.456.7890.
Emails
Users
43
User Detail
Description
Time Zone
Time zone where the user is located. When the user logs in, all times reflect the time zone of
the user. For example, schedules display the local time in the user time zone.
Default time zone is Pacific Daylight Time, Los Angeles.
Description
Description
User Roles
User Groups
User group for the user. A user group can help define or limit the tasks that a user can
perform.
The organization administrator configures user groups. If no user groups are listed, no user
groups are defined for the organization.
Note: When you implement user groups, best practice is to assign every user to a user group.
Allow Data
Preview
Allows the user to preview data when configuring a data synchronization task.
By default, this option is enabled. For maximum data security, clear this option.
Configuring a User
1.
To create a user, click Administer > Users, and then click New.
To edit a user, click Administer > Users, click the user name in the list of users, and then click Edit.
2.
On the New User page or Edit User page, configure the user properties.
3.
Configure the user details and security options, and then click OK.
Click Administer > Users, and then click the user name.
User details appear on the View User page.
To edit the user, click Edit.
Deleting a User
Delete a user if the user no longer needs to access Informatica Cloud.
44
1.
2.
On the Users page, click the Delete icon next to the user name.
Audit Logs
The audit log displays Informatica Cloud events for each user. It displays user login, create, update, and
delete operations.
To view the audit log, click Administer > Audit Log.
By default, the audit log shows events for the past 12 months. To change the length of time that events
appear in the audit log, contact Informatica Global Customer Support.
You want your development team to create tasks and task flows. To do this, the development team needs
to view sample data in development, but you want to restrict access to production data. You also have a
reporting team that needs to run tasks, but does not have the technical knowledge to configure tasks
safely.
For these two teams, create two separate user groups. For the development team, create a Developer user
group and control the user group as follows:
1.
Configure the Developer group with full permissions for tasks and related objects, but only read
permission for connections.
2.
Assign the Designer role and the Developer group to the users in your development team. When
configuring users, select Allow Data Preview to help with task development.
3.
If possible, create development connections to sample data. If you have both development and
production connections, configure production connections so the Developer group does not have read
permission. This prevents the Developer group from using production connections in tasks.
4.
After testing is complete and tasks are ready to move into production, have an organization administrator
or other qualified user configure the tasks to use production connections.
5.
Edit the Developer user group to remove the permission to run tasks. If development is complete for a
task type, you can also remove permission to read or update the task type and related objects as well.
By removing the read permission, you prevent the Developer group from accessing any information
about production tasks.
For the reporting team, create a Reporting user group, and control the group as follows:
1.
Configure the Reporting group with permission to read and run tasks and task flows, and permission to
read, create, and update schedules. Do not allow the group to edit or delete objects in the organization,
or to change permissions for objects in the organization.
2.
Assign the Designer role and the Reporting group to the users in your reporting team.
You want a site operator who can assign roles and user groups and configure access control, but cannot
create, edit, or run tasks.
1.
Assign the Admin role to the site operator user. With the Admin role, the site operator can configure
users and user groups and manage the organization. To limit access to tasks, connections, and
schedules, assign the site operator to a restrictive Site Operator user group.
45
2.
46
Assign permissions to read objects and to configure permissions for all object types. If the Site
Operator group needs to download and install the Secure Agent, also grant the group create
permission for Secure Agents.
Restrict all other permissions. By revoking the create, update, delete, or run permissions on objects,
you limit the Site Operator group to performing administrative tasks.
CHAPTER 5
Connector Administration
This chapter includes the following topics:
2.
On the Published Connectors page, to select an Informatica Cloud Connector for free trial, click Free
Trial for the connector.
47
The connector becomes available as a connection type for the entire organization. The connection type
displays with the following naming convention: <connector name> - <publisher name>.
3.
If you would like to buy a license for a connection with an expired free trial, click Contact Us.
An Informatica Cloud representative will contact you with purchase details about a license.
After you install a connector, it displays on the Published Connectors page with the "Connector Available"
message.
Configure Java security for a Microsoft Dynamics CRM instance that uses self-signed certificates.
2.
Resolve hosts.
3.
4.
5.
After you perform the additional configuration, restart the Secure Agent.
Generate root and intermediate SSL certificates for HTTPS URL (.cer files).
2.
3.
Use the following command to import HTTPS certificates to the Informatica Java Runtime Environment
(JRE):
<SecureAgent_InstallDir>/jre/bin/
keytool -importcert -alias <certificate alias name> -file " <certificate path>
\<certificate filename>" -keystore ..\lib\security\cacerts -trustcacerts
The Certificate Alias Name is any unique name and certificate file name includes the full path to the .cer
files used in Step 1.
The default JRE password is "changeit".
48
Open the Kerberos configuration file, krb5.conf, located in the following directory:
2.
<SecureAgent_InstallDir>/main/bin/rdtm/javalib/msdcrm/conf
[libdefaults]
default_realm = <fully qualified domain name>
default_tkt_enctypes = rc4-hmac
default_tgs_enctypes = rc4-hmac
permitted_enctypes = rc4-hmac
[realms]
<fully qualified domain name> = {
kdc = <domain controller hostname>.<fully qualified domain name>
default_domain = <fully qualified domain name>
}
[domain_realm]
.<fully qualified domain name> = <fully qualified domain name>
If the Microsoft Dynamics CRM server pool identity is set to a specific user account, add the
serverprincipal="<user name>" entry to the file as follows:
spnego-client {
com.sun.security.auth.module.krb5LoginModule required
serverprincipal="<user name>"
storePass=true;
};
The user name is the user account used by the application pool and defined in the Active Directory
properties.
If the Microsoft Dynamics CRM server pool identity is set to a network service, add the
serverprincipal="<URL>" entry to the file as follows:
spnego-client {
com.sun.security.auth.module.krb5LoginModule required
serverprincipal="<URL>"
storePass=true;
};
The URL is the HTTP SPN entry for the Microsoft Dynamics CRM instance.
49
Create a configuration file to associate NetSuite record field names with related NetSuite search record
field names.
This must be done before NetSuite objects can be used as sources in tasks. When a field name in a
NetSuite record matches the related field name in the corresponding SearchBasic search record, users
can define a filter for the field in tasks. When a field name in a record does not match the related search
record field name, users cannot define a filter for the field in tasks.
Users define filters for fields in the following locations:
2.
Query options in the Sources page of the Mapping Configuration Task wizard when the source object
in the mapping is parameterized
2.
In each section, list the record field names and related SearchBasic field names, as follows:
[<record 1>]
<record field name>=<SearchBasic field name>
<record field name2>=<SearchBasic field name2>
[<record 2>]
<record field name>=<SearchBasic field name>
<record field name2>=<SearchBasic field name2>
<record field name3>=<SearchBasic field name3>
For example:
[Account]
acctName=name
addr1=address1
3.
4.
50
Update both files as required. Make sure the files contain matching information.
Make a copy of the NetSuiteCustomFields.ini file, which is located in the following folder:
<SecureAgent_InstallDir>\packages\packageNetsuiteConnector.<version>\package\rdtm\javalib
2.
Modify the file to include custom NetSuite fields following these guidelines:
Create a separate section for each NetSuite record for which you want to add custom fields.
Add the custom fields using the following format, where the value of scriptId is the ID field in the
NetSuite user interface for each custom field:
[<Object Name>]
scriptIds = <custom field name1>,<custom field name2>,<custom field name3>
For example:
[Sales]
scriptIds = discountPrice,salesDescription,salesEvent
3.
2.
3.
51
The following table shows the secure agent system and the related VC++ redistributable versions to
install:
Secure Agent System
Windows 7 64-bit
Linux
Not required.
Verify that your system meets the requirements for each redistributable version you install.
2.
2.
Download the classic RFC SDK libraries for the Secure Agent system.
To connect to Unicode SAP systems, download the classic RFC SDK Unicode 7.2 libraries.
To connect to non-Unicode SAP systems, download the classic RFC SDK non-Unicode 7.1 libraries.
Verify that you download the classic RFC SDK libraries and not the SAP NetWeaver RFC SDK libraries.
52
The following table lists the Secure Agent system and the associated service archive (SAR) file for the
RFC SDK Unicode 7.2 libraries and RFC SDK non-Unicode 7.1 libraries:
Secure Agent System
Windows 64-bit
RFC_10-10009747.SAR
Windows 32-bit
RFC_10-10009746.SAR
Linux 64-bit
RFC_10-10009745.SAR
Linux 32-bit
RFC_10-10009742.SAR
Use the most recent patch available. The SAP file name might vary based on the version.
3.
4.
5.
53
Type R
For SAP IDoc Reader connections only. Connects to an SAP system to receive outbound IDocs. The
following text shows a sample Type R entry:
DEST=sapr346CLSQA
TYPE=R
PROGID=PID_LSRECEIVE
GWHOST=sapr346c
GWSERV=sapgw00
RFC_TRACE=1
Type
Description
DEST
A, B, R
TYPE
A, B, R
ASHOST
SYSNR
R3NAME
MSHOST
GROUP
PROGID
GWHOST
GWSERV
RFC_TRACE
A, R
54
2.
In the saprfc.ini file, create an entry for each SAP connection that you want to use.
Create a Type A entry for an IDoc Reader or RFC/BAPI connection type. Create a Type R entry for an
IDoc Writer connection type. Create a Type B entry for load balancing.
If you connect to multiple SAP systems, create appropriate entries for each system with unique DEST
parameters.
3.
4.
Copy saprfc.ini to the following directory for every Secure Agent machine that you want to use:
<SecureAgent_InstallDir>/main/bin/rdtm.
2.
3.
4.
5.
After the administrator has performed the configuration, users can set up and use an SAP table connection in
data synchronization and mapping configuration tasks.
55
The following table shows the secure agent system and the related VC++ redistributable versions to
install:
Secure Agent System
Windows 7 64-bit
Linux
Not required.
Verify that your system meets the requirements for each redistributable version you install.
2.
2.
Download the appropriate installer for 32-bit SAP JCo libraries and unzip the following file:
Secure Agent System
Windows
sapjco3-NTintel-3.0.11.zip
Linux
sapjco3-linuxintel-3.0.11.tgz
56
3.
Set the PATH environment variable to the location where you unzipped the file.
4.
5.
2.
Download the Classic RFC SDK Unicode 7.2 libraries for the Secure Agent system.
Verify that you use the Classic RFC SDK libraries and not the NetWeaver RFC SDK libraries.
SAP provides the RFC SDK Unicode 7.2 libraries in the following service archive (SAR) files:
Secure Agent System
Windows 64-bit
RFC_10-10009747.SAR
Windows 32-bit
RFC_10-10009746.SAR
Linux 64-bit
RFC_10-10009745.SAR
Linux 32-bit
RFC_10-10009742.SAR
Use the most recent version available. The SAP file name might vary based on the version.
3.
4.
5.
57
Type
Description
DEST
A, B
58
TYPE
A, B
ASHOST
A, B
SYSNR
A, B
R3NAME
MSHOST
saprfc.ini Parameter
Type
Description
GROUP
RFC_TRACE
2.
In saprfc.ini, create an entry for each SAP connection that you want to use.
Create a Type A entry for each system with unique DEST parameters. Create a Type B entry to
configure load balancing.
3.
For an saprfc.ini file that contains information about a source SAP system, copy the file to a directory
local to each Secure Agent that you want to read from SAP. Repeat this step for every Secure Agent that
you want to read from SAP.
2.
For an saprfc.ini file that contains information about a target SAP system, copy the saprfc.ini file to the
following directory: <SecureAgent_InstallDir>/main/bin/rdtm. Repeat this step for every Secure Agent
that you want to read from SAP.
3.
For each Secure Agent machine that you use, configure the RFC_INI environment variable to point to
the location of the saprfc.ini file.
Required Authorization
DELE, LIST, PLAN, SHOW.
Set Job Operation to RELE.
S_PROGRAM
BTCSUBMIT, SUBMIT
S_RFC
S_TABU_DIS
&_SAP_ALL
59
The following table describes the required authorization to write to SAP tables:
Write Object Name
Required Authorization
S_RFC
/INFATRAN/ZPMW
S_TABU_DIS
&_SAP_ALL
Object Type
Description
/INFADI/TABLEACCESS
Package
/INFADI/TBLRDR
Function
Group
/INFADI/RFC_READ_TABLES
Function
Module
/INFADI/EXECUTE_DYNQUERY
Program
/INFADI/IMPORTFLDS
Table
/INFADI/TABLEDATA
Table
Find the transport files in the following directory on the Secure Agent machine:
<SecureAgent_InstallDir>\main\bin\rdtm\sap-transport\SAPTableReader.
2.
Copy the cofile transport file to the Cofile directory in the SAP transport management directory on each
SAP machine that you want to access.
The cofile transport file uses the following naming convention: TABLE_READER_K<number>.G00.
3.
4.
60
Copy the data transport file to the Data directory in the SAP transport management directory on each
SAP machine that you want to access.
The data transport file uses the following naming convention: TABLE_READER_R<number>.G00.
5.
6.
To import the transports to SAP, in the STMS, add the transport request to the system queue. To do so,
click Extras > Other Requests > Add.
7.
In the Add Transport Request to Import Queue dialog box, enter the request number for the cofile
transport.
The request number inverts the order of the renamed cofile as follows: G00K<number>.
For example, for a cofile transport file renamed K900556.G00, enter the following request number:
G00K900556.
8.
In the Request area of the import queue, select the select the transport request number that you added,
and click Import.
On the Secure Agent machine, use the ODBC Administrator to configure a System DSN.
2.
In the Informatica Cloud organization, configure an ODBC connection to use the System DSN and a SQL
authenticated login.
61
CHAPTER 6
Object Migration
Object Migration Overview
You can migrate objects from a source organization to a target organization. A source organization is the
organization that contains the object that you want to migrate. The target organization is the organization
where you want to migrate the object.
For example, you might have separate organizations for development, test, and production environments.
You create tasks in the development organization. After task development, you migrate the tasks from the
development organization (the source organization) to the test organization (the target organization). After
you test and validate tasks in the test organization, you then migrate the tasks from the test organization to
the production organization.
You can migrate the following types of objects:
Integration templates
Connections
Saved queries
If you select tasks or task flows from the source organization, any related objects (tasks, connections,
integration templates, mappings, mapplets, and saved queries) are also selected.
Migration Requirements
Before you migrate an object, ensure you meet the following requirements:
62
You must have at least two organizations registered with Informatica Cloud.
Your user account in the target organization must have the Admin role.
Migrating an Object
1.
2.
3.
4.
5.
In the Informatica Cloud Login dialog box, enter the user name and password for the source
organization and click OK.
6.
7.
In the Add Objects dialog box, select the type of object to migrate.
All objects of that type display in the Available Objects list.
8.
Move the objects that you want to migrate from the Available Objects list to the Selected Objects list.
You can use the Shift or Ctrl keys to select multiple objects.
9.
10.
To migrate additional objects, repeat steps 7 - 8 for each type of object that you want to migrate.
Click OK.
The Objects to Migrate area displays the selected objects, dependent objects, and related messages.
You can use the Delete icon to remove an object from the list.
11.
To migrate the listed objects, click OK. When a confirmation message displays, click OK again.
A summary of the migration displays when the migration completes.
Post-migration Tasks
Perform the following tasks after you migrate objects:
Schedule tasks and task flows. Schedule information is not migrated with tasks or task flows.
Configure connection passwords and security token after migration. Connection passwords and security
tokens are not migrated.
After you migrate a data replication task, verify the target prefix information.
After you migrate objects, verify the runtime environment. The migration process assigns all connections
to the first available runtime environment in the list of runtime environments in the target organization.
If you select mapping configuration tasks, integration templates, mappings, or mapplets with the same
names as existing objects in your target organization, you have the option to overwrite the target objects
with the source objects. Other types of tasks, task flows, connections, and saved queries might not be
overwritten.
Migrating an Object
63
64
When you migrate an object, the migration includes all dependent objects except for objects installed from
a bundle. In the target organization, you can only see and access the objects with valid licenses.
You can migrate an object that uses objects from a bundle when the target organization has the bundle
installed.
When you select an object for migration more than once, Informatica Cloud migrates an object one time.
For example, if you select a mapping and several tasks based on the mapping, Informatica Cloud
migrates the mapping one time.
As a security measure, passwords and security tokens are not migrated with connections.
Informatica Cloud assigns all migrated connections to the first available runtime environment in the list of
runtime environments for the target organization.
When you migrate a data replication task, Informatica Cloud includes target prefix information.
INDEX
access permissions 41
Admin role 36
audit logs 45
authentication 15
C
Changing organizations 17
Cloud Developer community
URL 7
configuring 32
connections
additional configuration for Microsoft Dynamics CRM 48
configuration for SAP IDoc and RFC/BAPI connections 51
configuration for SAP table connections 51, 55
SAP configuration requirements 60
storing properties 16
connectors 47
custom configuration properties
Secure Agent 28, 30
D
Designer role 37
directories
configuring Secure Agent login to access 25
E
email notification
overview 15
encryption key password
for connection properties 16
I
Informatica Cloud
components 9
license types 18
menus 10
Informatica Cloud Community
URL 7
Informatica Cloud Connectors
installing 47
Informatica Cloud hosting facility
description 9
Informatica Cloud sidebar
description 11
Informatica Cloud web site
URL 7
Java security
for Microsoft Dynamics CRM connections using Active Directory 48
Java security policy files
for Microsoft Dynamics CRM connections using Active Directory 49
K
Kerberos configuration file
for Microsoft Dynamics CRM connections using Active Directory 49
Kerberos login configuration file
for Microsoft Dynamics CRM connections using Active Directory 49
L
libraries
to read from and write to SAP tables 56
to read from SAP tables 56
to write to SAP tables 57
license types
overview 18
licenses
editing sub-organization licenses 19
expiration 20
management 17
Org Hierarchy license 19
sub-organizations 19
types 18
Linux
configuring proxy settings 27
Secure Agent installation 27
starting and stopping the Secure Agent 34
uninstalling the Secure Agent 28
Live Chat
access 11
M
Main page
description 10
Microsoft Dynamics CRM
additional configuration for Active Directory 48
configuring Java security Active Directory 48
configuring the Kerberos configuration file for Active Directory 49
configuring the Kerberos login configuration file for Active Directory
49
downloading Java security policy files for Active Directory 49
resolving hosts for Active Directory 48
65
migration
objects 63
of objects between organizations 62
requirements 62
rules and guidelines 63
Minimum Character Mix
organization property 15
N
NetSuite
administration 50
configuration for custom NetSuite fields 50
configuration for search record field names 50
filters 50
O
object migration 62
object-level permissions
overview 40
ODBC
connecting to Siebel 61
organization hierarchy
creating a sub-organization 17
linking an organization as a sub-organization 17
overview 16
organization security
overview 35
organizations
authentication 15
changing within an organization hierarchy 17
creating 14
creating a sub-organization 17
license expiration 20
linking an organization as a sub-organization 17
storing connection properties 16
P
passwords
expiration 15
restrictions 15
permissions
configuring for a user group 38
configuring for individual objects 41
for individual objects 40
overview 39
required to perform tasks 41
rules and guidelines 41
privileges
description 36
proxy settings
configuring on Linux 27
configuring on Windows 24
R
registering
Secure Agent on Linux 27
requirements
Secure Agent 22
resolving hosts
for Microsoft Dynamics CRM connections using Active Directory 48
66
Index
roles
Admin 36
best practices 41
Designer 37
overview 36
rules and guidelines 41
Service Consumer 37
runtime environments
adding and removing Secure Agents 32
assigning more than one Secure Agent 22
assigning Secure Agents 32
configuring 32
S
SAP
additional configuration for IDocs and RFC/BAPI connection types
51
additional configuration for SAP table connections 51, 55
installing transport files for processing table data 60
SAP libraries
for SAP IDoc and RFC/BAPI connections 51, 52, 55
to read from and write to SAP tables 56
to read from SAP tables 56
to write to SAP tables 57
SAP user authorization
configuring to process table data 59
saprfc.ini
configuring for IDoc and RFC/BAPI 55
configuring for SAP IDoc and BAPI/RFCI 53
configuring for SAP tables 58, 59
entry types for IDoc and RFC/BAPI 53
entry types for SAP tables 58
parameters for IDoc and RFC/BAPI 54
parameters for SAP tables 58
Secure Agent
description 9
downloading 32
storing connection properties 16
Secure Agent Manager
stopping and restarting the Secure Agent 33
Secure Agents
custom configuration properties 28, 30
assigning to runtime environments 32
configuring a Windows service login 25
deleting 34
downloading 23
installing and registering on Linux 27
installing on Windows 24
IP address ranges for firewall access 23
overview 21
requirements 22
rules and guidelines 33
starting and stopping on Linux 34
stopping and restarting on Windows 33
uninstalling on Linux 28
uninstalling on Windows 25
view details, refresh status 31
viewing history 32
viewing status on Linux 31
security
two-factor authentication 15
Service Consumer role 37
sidebar
Informatica Cloud 11
Siebel
configuring connection through ODBC 61
sub-organizations
creating 17
editing licenses 19
in an organization hierarchy 16
job limits 19
license expiration 20
licenses 19
linking an existing organization 17
T
time zones
associating with a user 44
in email notification 15
trust site
description 8
two-factor authentication
description 15
U
user groups
best practices 41
configuring 38
deleting 38
object-level permissions 40
V
viewing
Secure Agent status 31
user details 44
user group details 38
W
Windows
configuring proxy settings 24
Windows service
configuring Secure Agent login 25
Index
67