ic spring2015 administratorguide

Upload: niraj

Post on 07-Aug-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/20/2019 IC Spring2015 AdministratorGuide

    1/67

    Informatica Cloud (Spring 2015)

      dministrator Guide

  • 8/20/2019 IC Spring2015 AdministratorGuide

    2/67

    Informatica Cloud Administrator Guide

    Spring 2015  April 2015

    Copyright (c) 1993-2015 Informatica Corporation. All rights reserved.

    This software and documentation contain proprietary information of Informatica Corporation and are provided under a license agreement containing restrictions on useand disclosure and are also protected by copyright law. Reverse engineering of the software is prohibited. No part of this document may be reproduced or transmitted inany form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica Corporation. This Software may be protected by U.S.and/or international Patents and other Patents Pending.

    Use, duplication, or disclosure of the Software by the U.S. Government is subject to the restrictions set forth in the applicable software license agreement and asprovided in DFARS 227.7202-1(a) and 227.7702-3(a) (1995), DFARS 252.227-7013©(1)(ii) (OCT 1988), FAR 12.212(a) (1995), FAR 52.227-19, or FAR 52.227-14

    (ALT III), as applicable.

    The information in this product or documentation is subject to change without notice. If you find any problems in this product or documentation, please report them to usin writing.

    Informatica, Informatica Platform, Informatica Data Services, PowerCenter, PowerCenterRT, PowerCenter Connect, PowerCenter Data Analyzer, PowerExchange,PowerMart, Metadata Manager, Informatica Data Quality, Informatica Data Explorer, Informatica B2B Data Transformation, Informatica B2B Data Exchange InformaticaOn Demand, Informatica Identity Resolution, Informatica Application Information Lifecycle Management, Informatica Complex Event Processing, Ultra Messaging andInformatica Master Data Management are trademarks or registered trademarks of Informatica Corporation in the United States and in jurisdictions throughout the world. All other company and product names may be trade names or trademarks of their respective owners.

    Portions of this software and/or documentation are subject to copyright held by third parties, including without limitation: Copyright DataDirect Technologies. All rightsreserved. Copyright © Sun Microsystems. All rights reserved. Copyright © RSA Security Inc. All Rights Reserved. Copyright © Ordinal Technology Corp. All rightsreserved.Copyright © Aandacht c.v. All rights reserved. Copyright Genivia, Inc. All rights reserved. Copyright Isomorphic Software. All rights reserved. Copyright © MetaIntegration Technology, Inc. All rights reserved. Copyright © Intalio. All rights reserved. Copyright © Oracle. All rights reserved. Copyright © Adobe SystemsIncorporated. All rights reserved. Copyright © DataArt, Inc. All rights reserved. Copyright © ComponentSource. All rights reserved. Copyright © Microsoft Corporation. Allrights reserved. Copyright © Rogue Wave Software, Inc. All rights reserved. Copyright © Teradata Corporation. All rights reserved. Copyright © Yahoo! Inc. All rightsreserved. Copyright © Glyph & Cog, LLC. All rights reserved. Copyright © Thinkmap, Inc. All rights reserved. Copyright © Clearpace Software Limited. All rightsreserved. Copyright © Information Builders, Inc. All rights reserved. Copyright © OSS Nokalva, Inc. All rights reserved. Copyright Edifecs, Inc. All rights reserved.Copyright Cleo Communications, Inc. All rights reserved. Copyright © International Organization for Standardization 1986. All rights reserved. Copyright © ej-

    technologies GmbH. All rights reserved. Copyright © Jaspersoft Corporation. All rights reserved. Copyright © International Business Machines Corporation. All rightsreserved. Copyright © yWorks GmbH. All rights reserved. Copyright © Lucent Technologies. All rights reserved. Copyright (c) University of Toronto. All rights reserved.Copyright © Daniel Veillard. All rights reserved. Copyright © Unicode, Inc. Copyright IBM Corp. All rights reserved. Copyright © MicroQuill Software Publishing, Inc. Allrights reserved. Copyright © PassMark Software Pty Ltd. All rights reserved. Copyright © LogiXML, Inc. All rights reserved. Copyright © 2003-2010 Lorenzi Davide, Allrights reserved. Copyright © Red Hat, Inc. All rights reserved. Copyright © The Board of Trustees of the Leland Stanford Junior University. All rights reserved. Copyright© EMC Corporation. All rights reserved. Copyright © Flexera Software. All rights reserved. Copyright © Jinfonet Software. All rights reserved. Copyright © Apple Inc. Allrights reserved. Copyright © Telerik Inc. All rights reserved. Copyright © BEA Systems. All rights reserved. Copyright © PDFlib GmbH. All rights reserved. Copyright ©

    Orientation in Objects GmbH. All rights reserved. Copyright © Tanuki Software, Ltd. All rights reserved. Copyright © Ricebridge. All rights reserved. Copyright © Sencha,Inc. All rights reserved. Copyright © Scalable Systems, Inc. All rights reserved. Copyright © jQWidgets. All rights reserved. Copyright © Tableau Software, Inc. All rightsreserved. Copyright© MaxMind, Inc. All Rights Reserved. Copyright © TMate Software s.r.o. All rights reserved.

    This product includes software developed by the Apache Software Foundation (http://www.apache.org/), and/or other software which is licensed under various versionsof the Apache License (the "License"). You may obtain a copy of these Licenses at http://www.apache.org/licenses/. Unless required by applicable law or agreed to inwriting, software distributed under these Licenses is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express orimplied. See the Licenses for the specific language governing permissions and limitations under the Licenses.

    This product includes software which was developed by Mozilla (http://www.mozilla.org/), software copyright The JBoss Group, LLC, all rights reserved; softwarecopyright © 1999-2006 by Bruno Lowagie and Paulo Soares and other software which is licensed under various versions of the GNU Lesser General Public License Agreement, which may be found at http:// www.gnu.org/licenses/lgpl.html. The materials are provided free of charge by Informatica, "as-is", without warranty of any

    kind, either express or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose.

    The product includes ACE(TM) and TAO(TM) software copyrighted by Douglas C. Schmidt and his research group at Washington University, University of California,Irvine, and Vanderbilt University, Copyright (©) 1993-2006, all rights reserved.

    This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (copyright The OpenSSL Project. All Rights Reserved) andredistribution of this software is subject to terms available at http://www.openssl.org and http://www.openssl.org/source/license.html.

    This product includes Curl software which is Copyright 1996-2013, Daniel Stenberg, . All Rights Reserved. Permissions and limitations regarding thissoftware are subject to terms available at http://curl.haxx.se/docs/copyright.html. Permission to use, copy, modify, and distribute this software for any purpose with orwithout fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.

    The product includes software copyright 2001-2005 (©) MetaStuff, Ltd. All Rights Reserved. Permissions and limitations regarding this software are subject to termsavailable at http://www.dom4j.org/ license.html.

    The product includes software copyright © 2004-2007, The Dojo Foundation. All Rights Reserved. Permissions and limitations regarding this software are subject toterms available at http://dojotoolkit.org/license.

    This product includes ICU software which is copyright International Business Machines Corporation and others. All rights reserved. Permissions and limitationsregarding this software are subject to terms available at http://source.icu-project.org/repos/icu/icu/trunk/license.html.

    This product includes software copyright©

     1996-2006 Per Bothner. All rights reserved. Your right to use such materials is set forth in the license which may be found athttp:// www.gnu.org/software/ kawa/Software-License.html.

    This product includes OSSP UUID software which is Copyright © 2002 Ralf S. Engelschall, Copyright © 2002 The OSSP Project Copyright © 2002 Cable & WirelessDeutschland. Permissions and limitations regarding this software are subject to terms available at http://www.opensource.org/licenses/mit-license.php.

    This product includes software developed by Boost (http://www.boost.org/) or under the Boost software license. Permissions and limitations regarding this software aresubject to terms available at http:/ /www.boost.org/LICENSE_1_0.txt.

    This product includes software copyright © 1997-2007 University of Cambridge. Permissions and limitations regarding this software are subject to terms available athttp:// www.pcre.org/license.txt.

    This product includes software copyright © 2007 The Eclipse Foundation. All Rights Reserved. Permissions and limitations regarding this software are subject to termsavailable at http:// www.eclipse.org/org/documents/epl-v10.php and at http://www.eclipse.org/org/documents/edl-v10.php.

    This product includes software licensed under the terms at http://www.tcl.tk/software/tcltk/license.html, http://www.bosrup.com/web/overlib/?License, http://www.stlport.org/doc/ license.html, http://asm.ow2.org/license.html, http://www.cryptix.org/LICENSE.TXT, http://hsqldb.org/web/hsqlLicense.html, http://

  • 8/20/2019 IC Spring2015 AdministratorGuide

    3/67

    httpunit.sourceforge.net/doc/ license.html, http://jung.sourceforge.net/license.txt , http://www.gzip.org/zlib/zlib_license.html, http://www.openldap.org/software/release/license.html, http://www.libssh2.org, http:/ /slf4j.org/license.html, http://www.sente.ch/software/OpenSourceLicense.html, http://fusesource.com/downloads/license-agreements/fuse-message-broker-v-5-3- license-agreement; http://antlr.org/license.html; http://aopalliance.sourceforge.net/; http://www.bouncycastle.org/licence.html;http://www.jgraph.com/jgraphdownload.html; http://www.jcraft.com/jsch/LICENSE.txt; http://jotm.objectweb.org/bsd_license.html; . http://www.w3.org/Consortium/Legal/2002/copyright-software-20021231; http://www.slf4j.org/license.html; http:/ /nanoxml.sourceforge.net/orig/copyright.html; http://www.json.org/license.html; http://forge.ow2.org/projects/javaservice/, http://www.postgresql.org/about/licence.html, http://www.sqlite.org/copyright.html, http://www.tcl.tk/software/tcltk/license.html, http://www.jaxen.org/faq.html, http://www.jdom.org/docs/faq.html, http://www.slf4j.org/license.html; http://www.iodbc.org/dataspace/iodbc/wiki/iODBC/License; http: //www.keplerproject.org/md5/license.html; http://www.toedter.com/en/jcalendar/license.html; http://www.edankert.com/bounce/index.html; http://www.net-snmp.org/about/license.html; http://www.openmdx.org/#FAQ; http://www.php.net/license/3_01.txt; http://srp.stanford.edu/license.txt; http://www.schneier.com/blowfish.html; http://www.jmock.org/license.html; http://xsom.java.net; http://benalman.com/about/license/; https://github.com/CreateJS/EaselJS/blob/master/src/easeljs/display/Bitmap.js;http://www.h2database.com/html/license.html#summary; http://jsoncpp.sourceforge.net/LICENSE; http:/ /jdbc.postgresql.org/license.html; http://protobuf.googlecode.com/svn/trunk/src/google/protobuf/descriptor.proto; https://github.com/rantav/hector/blob/master/LICENSE; http://web.mit.edu/Kerberos/krb5-current/doc/mitK5license.html; http://jibx.sourceforge.net/jibx-license.html; https://github.com/lyokato/libgeohash/blob/master/LICENSE; https://github.com/hjiang/jsonxx/

    blob/master/LICENSE; https://code.google.com/p/lz4/; https://github.com/jedisct1/libsodium/blob/master/LICENSE; http://one-jar.sourceforge.net/index.php?page=documents&file=license; https://github.com/EsotericSoftware/kryo/blob/master/license.txt; http://www.scala-lang.org/license.html; https://github.com/tinkerpop/blueprints/blob/master/LICENSE.txt; and http://gee.cs.oswego.edu/dl/classes/EDU/oswego/cs/dl/util/concurrent/intro.html.

    This product includes software licensed under the Academic Free License (http://www.opensource.org/licenses/afl-3.0.php), the Common Development and DistributionLicense (http://www.opensource.org/licenses/cddl1.php) the Common Public License (http://www.opensource.org/licenses/cpl1.0.php), the Sun Binary Code License Agreement Supplemental License Terms, the BSD License (http:// www.opensource.org/licenses/bsd-license.php), the new BSD License (http://opensource.org/licenses/BSD-3-Clause), the MIT License (http://www.opensource.org/licenses/mit-license.php), the Artistic License (http://www.opensource.org/licenses/artistic-license-1.0) and the Initial Developer’s Public License Version 1.0 (http://www.firebirdsql.org/en/initial-developer-s-public-license-version-1-0/).

    This product includes software copyright © 2003-2006 Joe WaInes, 2006-2007 XStream Committers. All rights reserved. Permissions and limitations regarding thissoftware are subject to terms available at http://xstream.codehaus.org/license.html. This product includes software developed by the Indiana University Extreme! Lab.For further information please visit http://www.extreme.indiana.edu/.

    This product includes software Copyright (c) 2013 Frank Balluffi and Markus Moeller. All rights reserved. Permissions and limitations regarding this software are subjectto terms of the MIT license.

    This Software is protected by U.S. Patent Numbers 5,794,246; 6,014,670; 6,016,501; 6,029,178; 6,032,158; 6,035,307; 6,044,374; 6,092,086; 6,208,990; 6,339,775;6,640,226; 6,789,096; 6,823,373; 6,850,947; 6,895,471; 7,117,215; 7,162,643; 7,243,110; 7,254,590; 7,281,001; 7,421,458; 7,496,588; 7,523,121; 7,584,422;7,676,516; 7,720,842; 7,721,270; 7,774,791; 8,065,266; 8,150,803; 8,166,048; 8,166,071; 8,200,622; 8,224,873; 8,271,477; 8,327,419; 8,386,435; 8,392,460;

    8,453,159; 8,458,230; 8,707,336; 8,886,617 and RE44,478, International Patents and other Patents Pending.

    DISCLAIMER: Informatica Corporation provides this documentation "as is" without warranty of any kind, either express or implied, including, but not limited to, theimplied warranties of noninfringement, merchantability, or use for a particular purpose. Informatica Corporation does not warrant that this software or documentation iserror free. The information provided in this software or documentation may include technical inaccuracies or typographical errors. The information in this software anddocumentation is subject to change at any time without notice.

    NOTICES

    This Informatica product (the "Software") includes certain drivers (the "DataDirect Drivers") from DataDirect Technologies, an operating company of Progress SoftwareCorporation ("DataDirect") which are subject to the following terms and conditions:

    1.THE DATADIRECT DRIVERS ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT

    LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.

    2. IN NO EVENT WILL DATADIRECT OR ITS THIRD PARTY SUPPLIERS BE LIABLE TO THE END-USER CUSTOMER FOR ANY DIRECT, INDIRECT,

    INCIDENTAL, SPECIAL, CONSEQUENTIAL OR OTHER DAMAGES ARISING OUT OF THE USE OF THE ODBC DRIVERS, WHETHER OR NOT

    INFORMED OF THE POSSIBILITIES OF DAMAGES IN ADVANCE. THESE LIMITATIONS APPLY TO ALL CAUSES OF ACTION, INCLUDING, WITHOUT

    LIMITATION, BREACH OF CONTRACT, BREACH OF WARRANTY, NEGLIGENCE, STRICT LIABILITY, MISREPRESENTATION AND OTHER TORTS.

    Part Number: IC-AG-22000-0002

  • 8/20/2019 IC Spring2015 AdministratorGuide

    4/67

    Table of Contents

    Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    Informatica Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    Informatica Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    Informatica Cloud Web Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    Informatica Cloud Communities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    Informatica Cloud Marketplace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    Informatica Cloud Connector Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

    Informatica Knowledge Base. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

    Informatica Cloud Trust Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

    Informatica Global Customer Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

    Chapter 1: Introduction to Informatica Cloud Administration. . . . . . . . . . . . . . . . . . . . 9

    Informatica Cloud Administration Overv iew. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

    Informatica Cloud Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

    Informatica Cloud User Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    Informatica Cloud Menus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    Informatica Cloud Sidebar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    Logging in to Informatica Cloud. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    Informatica Administrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    Getting Started with Informatica Cloud Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    Chapter 2: Organization Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    Organization Administration Overv iew. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    Organization Creation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    Creating an Organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

    Organization Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

    Organization General Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

    Organization Email Notification Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

    Organization Authentication Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

    Connection Properties Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

    Organization Hierarchies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

    Creating a Sub-organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    Linking Organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    Changing Between Organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    License Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    License Types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

    License Categories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

    Sub-organization Licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    Monitoring Application Job Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    License Expiration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

    4 Table of Contents

  • 8/20/2019 IC Spring2015 AdministratorGuide

    5/67

    Chapter 3: Secure Agents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    Informatica Cloud Secure Agent Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    Runtime Environments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

    Secure Agent Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

    Secure Agent IP Address Ranges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Secure Agent Installation on Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Downloading the Secure Agent Installation Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Installing the Secure Agent on Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    Configuring the Proxy Settings on Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    Configuring a Login for a Windows Secure Agent Service. . . . . . . . . . . . . . . . . . . . . . . . . 25

    Uninstalling the Secure Agent on Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

    Secure Agent Installation on Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    Downloading the Secure Agent Installation Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    Installing and Registering the Secure Agent on Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    Configuring the Proxy Settings on Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    Uninstalling the Secure Agent on Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    Secure Agent Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    Configuring Secure Agent Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

    Viewing Secure Agent Status and Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    View the Secure Agent Status on Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    View the Secure Agent Audit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    Runtime Environment Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    Configuring Secure Agents in Runtime Environments. . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    Rules and Guidelines for the Secure Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

    Stopping and Restarting the Secure Agent on Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Starting and Stopping the Secure Agent on Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    Deleting a Secure Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    Chapter 4: User and User Group Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

    User and User Group Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

    Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

     Admin Role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

    Designer  Role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

    Service Consumer Role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

    User Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

    Configuring a User Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

    Viewing User Group Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

    Deleting a User Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

    Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

    Object-Level Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

    Configuring Object-Level Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

    Rules and Guidelines for Roles, User Groups, and Permissions. . . . . . . . . . . . . . . . . . . . . . . . 41

    Table of Contents 5

  • 8/20/2019 IC Spring2015 AdministratorGuide

    6/67

    Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

    User Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

    Configuring a User. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

    Viewing User Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

    Deleting a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

     Audit Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    User Configur ation Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    Chapter 5: Connector Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

    Connector Administration Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

    Installing an Informatica Cloud Connector. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

    Microsoft Dynamics CRM Connector Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

    Step 1. Configuring Java Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

    Step 2. Resolving Hosts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

    Step 3. Editing the Kerberos Configuration File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

    Step 4. Editing the Kerberos Login Configuration File. . . . . . . . . . . . . . . . . . . . . . . . . . . 49

    Step 5. Downloading Java Security Policy Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

    NetSuite Connector Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

    Step 1. Creating a Configuration File to Map NetSuite Fields. . . . . . . . . . . . . . . . . . . . . . . 50

    Step 2. Configuring the NetSuiteCustomFields.ini File. . . . . . . . . . . . . . . . . . . . . . . . . . . 51

    SAP IDocs and RFCs/BAPI Connector Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

    Step 1. Downloading and Instal ling the Microsoft Visual C++ Redistr ibutable. . . . . . . . . . . . 51

    Step 2. Downloading and Configuring SAP Libraries for IDoc and BAPI/RFC. . . . . . . . . . . . 52

    Step 3. Configuring saprfc.ini for IDoc and BAPI/RFC. . . . . . . . . . . . . . . . . . . . . . . . . . . 53

    SAP Table Connector Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

    Step 1. Downloading and Instal ling the Microsoft Visual C++ Redistr ibutable. . . . . . . . . . . . 55

    Step 2. Downloading and Configuring the Libraries for Table Read and Wri te. . . . . . . . . . . . 56

    Step 3. Configuring saprfc.ini for SAP Tables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

    Step 4. Configuring SAP User Authorization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

    Step 5. Installing SAP Table Connection Transport Files. . . . . . . . . . . . . . . . . . . . . . . . . 60

    Siebel Connector Administrat ion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

    Configuring an ODBC Connection for Siebel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

    Chapter 6: Object Migration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

    Object Migration Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

    Migration Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

    Migrating an Object. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

    Post-migration Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

    Migration Rules and Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

    I n d e x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

    6 Table of Contents

  • 8/20/2019 IC Spring2015 AdministratorGuide

    7/67

    Preface

    Welcome to Informatica Cloud, Informatica’s hosted applications. Informatica Cloud uses functionality from

    PowerCenter and Informatica Data Quality to provide easy-to-use, web-based applications.

    The Informatica Cloud Administrator Guide explains how administrators can set up and maintain Informatica

    Cloud organizations.

    Informatica Resources

    Informatica Documentation

    The Informatica Documentation team makes every effort to create accurate, usable documentation. If you

    have questions, comments, or ideas about this documentation, contact the Informatica Documentation team

    through email at [email protected] . We will use your feedback to improve our

    documentation. Let us know if we can contact you regarding your comments.

    The Documentation team updates documentation as needed. To get the latest documentation for your

    product, navigate to Product Documentation from http://mysupport.informatica.com .

    Informatica Cloud Web Site

    You can access the Informatica Cloud web site at http://www.informatica.com/cloud . This site contains

    information about Informatica Cloud editions and applications.

    Informatica Cloud Communities

    Use the Informatica Cloud Community to discuss and resolve technical issues in Informatica Cloud. You can

    also find technical tips, documentation updates, and answers to frequently asked questions.

     Access the Informatica Cloud Community at:

    http://www.informaticacloud.com/community

    Developers can learn more and share tips at the Cloud Developer community:

    http://www.informaticacloud.com/devcomm

    Informatica Cloud Marketplace

    Visit the Informatica Marketplace to try and buy Informatica Cloud Connectors, Informatica Cloud integration

    templates, and Data Quality mapplets:

    7

    http://www.informaticacloud.com/communityhttp://mysupport.informatica.com/mailto:[email protected]://www.informaticacloud.com/devcommhttp://www.informaticacloud.com/communityhttp://www.informatica.com/cloudhttp://mysupport.informatica.com/mailto:[email protected]

  • 8/20/2019 IC Spring2015 AdministratorGuide

    8/67

    https://community.informatica.com/community/marketplace/informatica_cloud_mall

    Informatica Cloud Connector Documentation

    You can access documentation for Informatica Cloud Connectors at the Informatica Cloud Community:

    https://community.informatica.com/cloud/index.htm

    You can also download individual connector guides: https://community.informatica.com/docs/DOC-2687 .

    Informatica Knowledge Base

     As an Informatica customer, you can access the Informatica Knowledge Base at

    http://mysupport.informatica.com . Use the Knowledge Base to search for documented solutions to known

    technical issues about Informatica products. You can also find answers to frequently asked questions,

    technical white papers, and technical tips. If you have questions, comments, or ideas about the Knowledge

    Base, contact the Informatica Knowledge Base team through email at [email protected].

    Informatica Cloud Trust SiteYou can access the Informatica Cloud trust site at http://trust.informaticacloud.com . This site provides real

    time information about Informatica Cloud system availability, current and historical data about system

    performance, and details about Informatica Cloud security policies.

    Informatica Global Customer Support

    You can contact a Customer Support Center by telephone or online.

    For online support, click Submit Support Request in the Informatica Cloud application. You can also use

    Online Support to log a case. Online Support requires a login. You can request a login at

    https://mysupport.informatica.com .

    The telephone numbers for Informatica Global Customer Support are available from the Informatica web siteat http://www.informatica.com/us/services-and-training/support-services/global-support-centers/ .

    8 Preface

    http://www.informatica.com/us/services-and-training/support-services/global-support-centers/https://mysupport.informatica.com/http://trust.informaticacloud.com/mailto:[email protected]://mysupport.informatica.com/https://community.informatica.com/docs/DOC-2687https://community.informatica.com/cloud/index.htmhttps://community.informatica.com/community/marketplace/informatica_cloud_mall

  • 8/20/2019 IC Spring2015 AdministratorGuide

    9/67

    C H A P T E R   1

    Introduction to Informatica Cloud

     Administration

    This chapter includes the following topics:

    • Informatica Cloud Administration Overview, 9

    • Informatica Cloud Components, 9

    • Informatica Cloud User Interface, 10

    • Logging in to Informatica Cloud, 11

    • Informatica Administrator, 11

    • Getting Started with Informatica Cloud Administration, 11

    Informatica Cloud Administration Overview

    Informatica Cloud administrators are responsible for the following activities:

    • Informatica Cloud organization and organization hierarchy setup and management

    • Informatica Cloud organization license management

    • Runtime envir onment management

    • User and user group setup and management

    • Connector configuration and management

    • Object migration

    By default, the user who creates an Informatica Cloud organization is the organization administrator. The

    organization administrator is the Informatica Cloud user responsible for managing the organization. If an

    organization has multiple administrators, the organization administrator is considered the lead administrator.

    By default, all users assigned the Admin role, which includes the organization administrator, have full accessto the entire organization.

    Informatica Cloud Components

    Informatica Cloud includes the following components:

    9

  • 8/20/2019 IC Spring2015 AdministratorGuide

    10/67

    Informatica Cloud

     A browser-based application that runs at the Informat ica Cloud hosting facili ty. It provides the ability to

    configure connections, create users, and create, run, schedule, and monitor tasks.

    Informatica Cloud hosting facility

     A fac ility where the Informatica Cloud application runs. The Informatica Cloud hosting fac ility stores al ltask and organization information.

    Informatica Cloud applications

     Applications used to perform tasks such as data synchronization, contact validation, and data replication.

    Informatica Cloud Secure Agent

     A component of Informatica Cloud instal led on a local machine that runs all tasks and provides f irewall

    access between the hosting facility and your organization. When the Secure Agent runs a task, it

    connects to the Informatica Cloud hosting facility to access task information, connects directly and

    securely to sources and targets, transfers data between sources and targets, and performs any

    additional task requirements.

    Informatica Cloud User Interface

    The Informatica Cloud user interface includes menus at the top of the page and a sidebar. Use the menus to

    work with Informatica Cloud and the sidebar to access information about Informatica Cloud.

    Informatica Cloud MenusInformatica Cloud provides several menus:

    • Home. Provides a training video and tips to use Informatica Cloud.

    • Monitor. View details about tasks that are running or complete. Access the Service and Process Monitor.

    •  Apps. Access Informatica Cloud applications and task wizards.

    • Design. Design task flows, bundles, integration templates, and mappings. Access the Service and

    Process Designer.

    10 Chapter 1: Introduction to Informatica Cloud Administration

  • 8/20/2019 IC Spring2015 AdministratorGuide

    11/67

    • Configure. Configure Informatica Cloud components, such as Secure Agents, connections, and saved

    queries. And download bundles and Informatica Cloud Connectors.

    •  Administer. Perform tasks to administer the organization, such as organization properties configuration

    and object migration.

    Click the Help icon on the sidebar to access help about the page that is currently in view.

    When you log in to Informatica Cloud, the Informatica Cloud Messages page might appear to tell you about

    upcoming maintenance.

    Informatica Cloud Sidebar 

    The Informatica Cloud sidebar provides instant access to the online help, the Informatica Cloud community,

    and online videos.

    Users with a paid license or within the 30-day trial period can submit a support request directly to Informatica

    Global Customer Support.

    During available hours, users with a paid license can also get real time help from a Informatica Global

    Customer Support specialist. To open a chat window, click the Live Chat icon on the Informatica Cloudsidebar.

    Logging in to Informatica Cloud

    Before you log in, verify that the browser meets the minimum system requirements.

    1. On the Informatica Cloud Login page, enter your user name and password. Your user name is typically

    your email address.

    2. When you log in to Informatica Cloud for the first time, you might need to configure a security question.

    Informatica Cloud uses the security question to verify your identity if you forget your password.

    Informatica Administrator 

    If you have access to the Informatica Administrator tool, you can use it to view Informatica Cloud organization

    properties. You cannot make any changes to the properties using the Administrator tool.

    For more information about the Administrator tool, see the Informatica Administrator Guide.

    Getting Started with Informatica Cloud Administration

    Before your company can use Informatica Cloud, you must set up your organization.

    Perform the following tasks to prepare your company's Informatica Cloud organization:

    • Create the organization and organization hierarchy and configure organization properties.

    • Ensure the organization and sub-organizations have the appropriate licenses.

    Logging in to Informatica Cloud 11

  • 8/20/2019 IC Spring2015 AdministratorGuide

    12/67

    • Install and configure Secure Agents and runtime environments.

    • Set up users and user groups.

    • Download and configure connectors.

    12 Chapter 1: Introduction to Informatica Cloud Administration

  • 8/20/2019 IC Spring2015 AdministratorGuide

    13/67

    C H A P T E R   2

    Organization Administration

    This chapter includes the following topics:

    • Organization Administration Overview, 13

    • Organization Creation, 13

    • Organization Properties, 14

    Organization Hierarchies, 16• License Management, 17

    Organization Administration Overview

     An Informatica Cloud organization is a secure area within the Informatica Cloud repository where you store

    information and objects.

    Informatica Cloud administrators maintain Informatica Cloud organizations and sub-organizations.

     Administration of Informatica Cloud organizations includes the following tasks:

    • Creating the organization

    • Setting organization properties

    • Creating and maintaining the organization hierarchy

    • Maintaining organization licenses

    To accomplish these tasks, log in to Informatica Cloud as an administrator.

    You can also view organization properties with the Informatica Administrator tool which you can access within

    the Informatica domain. For more information about the Informatica Administrator tool, see the Informatica

     Administrator Guide.

    Organization Creation

    You can create an organization on the Informatica Cloud website.

    When you sign up for an organization with Informatica Cloud, Informatica Cloud creates an organization

    administrator account with your email address as the user name and generates a temporary password. As an

    organization administrator, you are assigned the Admin role, which has full access to the organization.

    13

  • 8/20/2019 IC Spring2015 AdministratorGuide

    14/67

    Informatica Cloud sends your user name, password, and Informatica Cloud URL to your email address. When

    you log in to Informatica Cloud for the first time, click Login with Temporary Password in the email, or enter

    the user name and password provided in the email.

    Creating an Organization

    You can sign up for a trial version of Informatica Cloud on the Informatica Cloud website, which will create an

    organization. After you receive the trial version, you can click Buy Now to subscribe to an Informatica Cloud

    edition.

    1. Go to http://www.informatica.com  and click the link to start a trial version of Informatica Cloud, and then

    enter the information on the form.

    Informatica Cloud sends you a temporary password and a link to Informatica Cloud.

    2. To sign up for the full version, log in to Informatica Cloud and then in the Informatica Cloud sidebar, click

    Buy Now.

    Organization Properties

    Configure properties for your organization and sub-organizations on the My Organization page.

    You can configure the following properties:

    • General organization properties

    • Email notification properties

    •  Authentication properties

    • Connection properties storage

    To access the My Organization page, select Administer  > Organization .

    Organization General Properties

    You can set general properties for your organization such as the job execution profile and schedule offset.

    The job execution profile is the Informatica Cloud user account used to run contact validation tasks. For new

    organizations, by default, Informatica Cloud uses the organization administrator user account that created the

    organization as the job execution profile. You can change the job execution profile to any user account in the

    organization.

    The schedule offset is a small amount of time added to schedule start times to help prevent server overload

    at standard schedule start times. An organization has a single schedule offset that is applied to all schedules.

    The schedule offset does not affect the start time of manually started tasks or task flows.

    Though not displayed, the schedule offset for your organization is added to the time range configured for all

    schedules. This ensures that scheduled tasks run as often as expected. For example, you configure a

    schedule to run every hour from 8:00 a.m. to 12:00 p.m and the schedule offset for your organization is 15

    seconds. Your schedule runs at 8:00:15, 9:00:15, 10:00:15, 11:00:15, and 12:00:15.

    14 Chapter 2: Organization Administration

    http://www.informatica.com/http://www.informatica.com/

  • 8/20/2019 IC Spring2015 AdministratorGuide

    15/67

    Organization Email Notification Properties

    You can configure Informatica Cloud at an organizational level to send email notification when tasks

    complete successfully, complete with errors, or fail.

    Email notification properties can also be set at the task level. When a user specifies email notification in a

    task or task flow, Informatica Cloud sends email to the addresses in the task or task flow instead of theaddresses configured for the organization.

    Organization Authentication Properties

    Set authentication properties for your organization and sub-organizations.

    You can specify the following authentication options:

    • Password restrictions, such as the minimum number of characters and the minimum character mix

    allowed in a valid password, password reuse, and password expiration.

    • Whether to enable or disable two-factored authentication.

    Password Restrictions

    Configure the following password restrictions for all users in the organization:

    Password length

    Specify a number between 4 and 12 characters for the minimum length allowed for a valid password.

    Password expiration

    Specify whether passwords expire. If you specify that passwords expire, then specify the number of days

    until the password expires.

    Minimum number of characters

    Specify the minimum number of characters allowed in a valid password.

    Minimum character mix

    Specify the number of character sets required in valid passwords. Passwords can contain a mix of the

    following character sets:

    • Lowercase alphabetic characters

    • Uppercase alphabetic characters

    • Numeric characters

    • Special characters

    For example, if you set the Minimum Character Mix Option to 1, then passwords must contain at least

    one of the character sets. If you set the Minimum Character Mix Option to 2, then passwords must

    contain at least two of the character sets.

    Two-Factor Authentication

    Two-factor authentication uses trusted IP address ranges in addition to account passwords to enhance

    Informatica Cloud security. Configure the Two-Factor Authentication organization property when you want to

    increase security for your organization.

    When you configure two-factor authentication, you enter one or more trusted IP address ranges. A user with

    a valid login must have an IP address within the trusted IP address ranges to connect to your organization.

    Informatica Cloud supports IP address formats in IP version 4 (IPv4) and version 6 (IPv6).

    Organization Properties 15

  • 8/20/2019 IC Spring2015 AdministratorGuide

    16/67

    Note: If you enter an invalid IP address range, users cannot access your organization. Contact your network

    administrator for valid IP address ranges.

    Connection Properties Storage

    You can configure where to store connection properties for the organization.

    You can store connection properties with Informatica Cloud or with a local Secure Agent. You might store

    connection properties with a local Secure Agent if you need the connection properties to reside within your

    firewall. To store connection properties with a local Secure Agent, the organization must have the Externalize

    Connections license.

    When you store connection properties with Informatica Cloud, the connection properties are always available.

    Informatica Cloud backs up connection properties regularly as part of standard backup procedures.

    When you store properties with a local Secure Agent, the Secure Agent must be running to allow tasks to run

    and to allow users to work with connections. Back up connection properties regularly to prevent loss of data.

     A best practice is to back up connection properties after you change the locat ion or the encryption key for

    connection properties. Connection properties are stored in the following directory:

    /main/data

    Informatica Cloud generates an encryption key to secure connection properties stored with a Secure Agent.

     As the basis for the encryption key, you can use a randomly generated password or you can enter a custom

    password.

    Use a custom password when you want to update the encryption key periodically. You can change the

    custom password when you want to update the encryption key.

    When you change where you want to store connection properties, Informatica Cloud moves the connection

    properties to the appropriate location. For example, your license expires, so you configure the organization to

    store connections with Informatica Cloud. Informatica Cloud moves the connection properties from the local

    Secure Agent to Informatica Cloud.

    To determine where to store connection properties, configure the Connection Properties Storageorganization property.

    Organization Hierarchies

     An organization hierarchy is a hierarchy of related organizations that includes a parent organization and one

    or more sub-organizations. The administrator for a parent organization can create an organization hierarchy

    and manage sub-organization licenses. To create a sub-organization, the parent organization must have the

    Org Hierarchy license.

     An example of an organization hierarchy in practice is the use of sub-organizations for development, test,and production environments. You can use a sub-organization to develop tasks, a sub-organization to test

    the tasks, and another sub-organization to run the tasks. You can migrate the task objects from one sub-

    organization to another sub-organization. Another example is to create an organization hierarchy to reflect

    different groups of users, where you create a sub-organization for each group.

     An organization hierarchy can include a limited number of sub-organizations. The Maximum Sub-

    Organizations organization property states the maximum number of sub-organizations that are allowed for

    your organization. To increase the number of sub-organizations allowed for your organization, contact

    Informatica Global Customer Support.

    16 Chapter 2: Organization Administration

  • 8/20/2019 IC Spring2015 AdministratorGuide

    17/67

     A sub-organizat ion cannot be a parent to any organizations or be a part of any other organization hierarchy.

    You can add a sub-organization to the hierarchy in the following ways:

    • Create a sub-organization.

    • Link an existing organization. In the organization hierarchy, the organization that you link to becomes a

    sub-organization, and the organization you link from becomes the parent organization.

    Creating a Sub-organization

    The administrator of the parent organization can create a sub-organization.

    1. Log in to the parent organization and then click Administer  > Sub-organizations .

    2. On the Sub-organizations  page, click New.

    3. To enable user access, create user accounts and configure organization properties.

    Linking Organizations

    You can link an organization if all of the following conditions apply:

    • You have a user account with the organization.

    • The organization is not part of another organization hierarchy.

    • You are the administrator of the parent organization with the Org Hierarchy license.

    Note: You cannot remove a link between organizations.

    1. Log in to the organization that you want to be the parent organization and click Administer  > Sub-

    organizations .

    2. On the Sub-organizations  page, click Link Existing Organization.

    3. In the Informatica Cloud Login dialog box, enter the user name and password that you use to log in to

    the organization that you want to set up as a sub-organization.4. Click OK.

    5. In the Link Sub-organization dialog box, click OK to link the organization.

    The organization displays on the Sub-organizations  page.

    Changing Between Organizations

     An organization can have mult iple sub-organizations. I f you are set up as a user in multiple organizations,

    you can change between organizations in the organization hierarchy.

    To change to a different organization in the hierarchy:

    u In the upper right corner of the Informatica Cloud application, select the organization you want to view.

    License Management

    Licenses determine the Informatica Cloud subscription level for the organization and provide access to

    Informatica Cloud applications, features, connectors, and bundles.

     As an administ rator, you review licenses set up for your company, monitor job activities to see how usage

    aligns with your license subscription, and manage license expiration.

    License Management 17

  • 8/20/2019 IC Spring2015 AdministratorGuide

    18/67

    License Types

    When you create an Informatica Cloud organization, Informatica Cloud assigns the organization a license

    type for each application.

    Informatica Cloud uses the following types of licenses:

    Trial

    You can use the application free of charge for a 30-day period. At the end of the trial period, you can

    subscribe to the application. A trial subscription might provide limited access to the features of the data

    application.

    Subscription

    You can use the application for the duration of the contract period. Near the end of the contract period,

    Informatica Cloud indicates that the contract is about to expire. Renew the contract to continue to use

    the application.

    Free subscription

    You can use the Data Synchronization application free of charge. A free subscription might provide

    limited access to the features of the Data Synchronization application.

    License Categories

    Informatica Cloud licenses are categorized by application, feature, and functionality.

    The following license categories are available:

    Application license

     Application licenses provide access to Informatica Cloud applications such as Data Synchronization,

    Contact Validation, Data Replication, and Mapping Configuration.

    Feature license

    Feature licenses provide access to features such as fine-grained security, object migration, andSalesforce connectivity.

    Organization hierarchy license

    Use the organization hierarchy license to create a specified number of sub-organizations under the

    parent organization.

    Connector license

    Connector licenses provide connections to entities such as Amazon Redshift, NetSuite, and JDBC.

    Bundle license

    Bundle licenses provide access to a set of objects that improve developer productivity and enhance the

    overall quality of data conversion and data integration projects.

    Package license

    Package licenses provide access to packages such as the Financial Data and Data Standardization Data

    Quality packages.

    18 Chapter 2: Organization Administration

  • 8/20/2019 IC Spring2015 AdministratorGuide

    19/67

    Sub-organization Licenses

     A sub-organizat ion can be assigned licenses that are assigned to the parent organization and have licenses

    or subscriptions maintained by the parent organization.

    When you add a sub-organization, the sub-organization inherits all licenses and subscription options of the

    parent with the following exceptions:

    •  A sub-organizat ion does not inherit the Org Hierarchy l icense.

    •  A sub-organizat ion does not inherit bundle licenses. To use a bundle in the sub-organization, a user must

    install the bundle.

    If you link a sub-organization that has a license that the parent organization does not have, then the sub-

    organization loses the license.

     After you create or link a sub-organizat ion, you can edit the l icenses of the sub-organization.

    Note: You cannot edit the job limit of a sub-organization's license.

    Editing Sub-Organization Licenses

    The organization administrator can edit the licenses for the sub-organizations in the organization hierarchy.

    1. Log in to the parent organization and click on Administer  > Sub-organizations .

    2. Under Actions, click on the key icon next to the sub-organization you want to edit.

    3. Select licenses to enable features, and clear licenses to disable features.

    4. Optionally, modify expiration dates.

    5. Click OK to save your changes.

    Monitoring Application Job Details

    You can check the number of rows that your organization has processed and the number of jobs that your

    organization has run with each application.

    Some organizations have a daily or monthly limit on the number of jobs that can run for each application type.

    If your organization reaches the daily or monthly limit for an application, you cannot run additional jobs until

    the next day or the next month, respectively.

    If your organization subscribes to Informatica Cloud Express, you might want to check the monthly processed

    row counts because they can affect your monthly payment price. You might also want to check the number of

     jobs your organization runs. Organizations subscr ibed to Informatica Cloud Express can run 250 jobs a day

    for the subscribed application.

    Trial organizations can process a limited number of rows and jobs each day and month for each application

    type. The following number of rows and jobs are allowed for trial organizations by default:

    10,000 rows each day for each application, and 300,000 rows each month for each application• 25 jobs each day for each application, and 250 jobs each month for each application

    To view the number of processed rows and jobs that your organization has run, select Administer  >

    Licenses.

    License Management 19

  • 8/20/2019 IC Spring2015 AdministratorGuide

    20/67

    License Expiration

    When a license expires, you cannot access the application or features associated with the license and

    scheduled jobs associated with the license are disabled.

     After you extend the license and enable the l icense, you can access the application or features and the

    scheduled jobs resume processing. If all licenses for the organization expire, you cannot log in to InformaticaCloud.

    Sub-organization licenses must expire at the same time or before the parent organization licenses expire. If

    the parent organization license is disabled or set to expire at an earlier date, you must align these changes

    for the sub-organization. Edit the sub-organization licenses to confirm the changes.

    You can review the expiration date for licenses. To extend a license, contact Informatica Global Customer

    Support.

    20 Chapter 2: Organization Administration

  • 8/20/2019 IC Spring2015 AdministratorGuide

    21/67

    C H A P T E R   3

    Secure Agents

    This chapter includes the following topics:

    • Informatica Cloud Secure Agent Overview, 21

    • Secure Agent Installation on Windows, 23

    • Secure Agent Installation on Linux, 26

    Secure Agent Properties, 28• Runtime Environment Configuration, 32

    • Rules and Guidelines for the Secure Agent, 33

    • Stopping and Restarting the Secure Agent on Windows, 33

    • Starting and Stopping the Secure Agent on Linux, 34

    • Deleting a Secure Agent, 34

    Informatica Cloud Secure Agent Overview

    The Informatica Cloud Secure Agent is a lightweight program that runs all tasks and enables secure

    communication across the firewall between your organization and Informatica Cloud. When the Secure Agent

    runs a task, it connects to the Informatica Cloud hosting facility to access task information. Then the Secure

     Agent connects directly and securely to sources and targets, t ransfers data between sources and targets,

    and performs any additional task requirements.

    When you install a Secure Agent, all Informatica Cloud users in the organization share the Secure Agent.

    The Secure Agent must be running to run tasks. Run multiple Secure Agents to improve scalability or to

    create backup agents. You can run one Secure Agent on each machine. You assign Secure Agents to

    runtime environments, which you assign to connections and tasks.

    To set up and manage Secure Agents for your business needs, you perform the following tasks:

    1. Install Secur  e Agents.

    2. Set Secure Agent properties.

    3. Configure runtime environments.

    21

  • 8/20/2019 IC Spring2015 AdministratorGuide

    22/67

    Runtime Environments

     A runtime environment is an environment that you configure to access connections and to run tasks. You can

    assign one or more Secure Agents to a runtime environment.

    By default, a Secure Agent is assigned to its own runtime environment. If you have the Secure Agent Cluster

    license, you can add more than one Secure Agent to a runtime environment.

    You can create runtime environments to serve different functions. For example, you create a production

    runtime environment and a test runtime environment. You configure connections in the production runtime

    environment to the production organization in Salesforce and the production databases. You configure

    connections in the test runtime environment to the sandbox organization in Salesforce and the test

    databases. You test changes to mappings in the test runtime environment to ensure they run properly before

    deploying the changes to the production runtime environment.

     A runtime environment with more than one Secure Agent can increase scalability and f lexibility , because

    tasks can run if one of the Secure Agents is available. In addition, when you add or delete Secure Agents to

    a runtime environment with other Secure Agents, you do not have to edit associated connections or tasks.

    If you assign more than one Secure Agent to a runtime environment, then all the Secure Agents must be

    functionally the same. Verify that the installation directory and directory paths are the same on each Secure Agent machine in the runtime environment. Ensure that all Secure Agents assigned to a particular runtime

    environment are configured and enabled to connect to the same external systems, which includes access to

    the files needed for connections, such as libraries, initialization files, and JAR files. If files are used as part of

    data integration tasks, ensure the files are available in a shared file system location.

    When you start a task in a runtime environment with more than one Secure Agent, one of the Secure Agents

    runs the task. After a task is complete, to see which Secure Agent ran the task, go to Monitor  > Activity Log

    and click on the task name. You might need to access the local machine with the Secure Agent that ran the

    task to see success files and error files for certain connections.

    Secure Agent Requirements

    The following table describes the requirements for the Secure Agent:

    Requirement Description

    Operating System Use one of the fol lowing operating systems:- Microsoft Windows versions:

    - Windows 7 (32-bit or 64-bit)

    - Windows XP Pro SP2 or SP3 (32-bit)

    - Windows 2008 R2 (32-bit or 64-bit)

    - Linux (32-bit or 64-bit) with the following configuration:

    - Red Hat Enterprise Linux version 6.x and above

    - SUSE Linux Enterprise version 11.0 and above

    Disk Space 500 MB.

    Internet Access Access to the web server that runs the Informatica Cloud applicat ion.

    Connect ivit y Network connecti vit y or internet access to sources and targets.

    For more information about Secure Agent requirements, contact Informatica Global Customer Support.

    22 Chapter 3: Secure Agents

  • 8/20/2019 IC Spring2015 AdministratorGuide

    23/67

    Secure Agent IP Address Ranges

    If your organization uses a protective firewall, include the Secure Agent IP address ranges on the list of

    approved IP addresses. This ensures the Secure Agent can perform all necessary tasks through the firewall.

    For the IP address ranges used by the Secure Agent, see the following community article:

    https://community.informatica.com/docs/DOC-2173 .

    Secure Agent Installation on Windows

    On Windows, the Secure Agent runs as a Windows service. When you install the Secure Agent, you also

    install the Informatica Cloud Secure Agent Manager.

    By default, the Secure Agent starts when you start Windows. Use the Secure Agent Manager to stop and

    restart the Secure Agent. You can also use the Secure Agent Manager to check the Secure Agent status, and

    configure proxy information.

    You can launch the Secure Agent Manager from the Start menu or desktop icon.

    When you close the Secure Agent Manager, it minimizes to the Windows taskbar notification area for quick

    access. Closing the Secure Agent Manager does not affect the Secure Agent status.

    When you install a Secure Agent, you perform the following steps:

    1. Ensure the machine on which you run the Secure Agent meets the minimum requirements.

    2. Download the Secure Agent installation wizard.

    3. Install and register the Secure Agent.

    You can perform the following tasks for a Secure Agent:

    • View the Secure Agent status.

    • View the Secure Agent details.

    • View the Secure Agent audit.

    • Stop the Secure Agent.

    • Restart the Secure Agent.

    • Configure proxy settings.

    • Configure a Windows network login.

    • Delete a Secure Agent.

    • Uninstall a Secure Agent.

    Downloading the Secure Agent Installation Wizard

    Download the Secure Agent installation wizard from Informatica Cloud. You can download and run the

    Secure Agent on any machine that meets the minimum requirements.

    1. Click Configure > Runtime Environments, and then click Download Secure Agent.

    2. Select the operating system on which you will run the Secure Agent, and then click Download.

    3. Save the installation wizard to the machine where you want to run the Secure Agent.

    The name of the Windows Secure Agent installation file is ag ent_install.exe. The name of the Linux

    Secure Agent installation file is agent_install.bin.

    Secure Agent Installation on Windows 23

    https://community.informatica.com/docs/DOC-2173https://community.informatica.com/docs/DOC-2173

  • 8/20/2019 IC Spring2015 AdministratorGuide

    24/67

    Installing the Secure Agent on Windows

    You can install one Secure Agent on each machine. You must uninstall the existing Secure Agent from the

    machine before you install a new Secure Agent. After the installation completes, a registration page appears.

    Use your Informatica Cloud username and password to register the Secure Agent. After you complete the

    registration, the Secure Agent Manager displays the Secure Agent status.

    If the organization requires a proxy server to connect to the internet, the installation wizard configures the

    proxy settings for the Secure Agent based on the proxy settings in the browser. You must configure the proxy

    settings if they change or are incorrectly configured by the installation program.

    Configure a login to allow the Secure Agent to access directories to configure and run tasks. When you

    configure or run tasks that use Flat File or FTP/SFTP connection types, the Secure Agent might require

    permissions to read or write information to related directories.

    To install the Secure Agent on Windows:

    1. Open the directory where you downloaded agent_install.exe, and double-click the file.

    2. Choose the installation folder and click Next.

    3. Review the pre-installation summary and click Install.

    4. After the installer completes, click Done.

     A registration page appears.

    5. Enter your Informatica Cloud user name and password and click Register .

    The Secure Agent starts.

    The Informatica Cloud Secure Agent window displays the status of the Secure Agent. You can restart,

    stop, and configure the Secure Agent proxy in this window. You can close the window at any time. The

    Secure Agent continues to run as a service until stopped.

    6. Close the Secure Agent Manager.

    The Secure Agent Manager minimizes to the Windows taskbar notification area. Closing the Secure

     Agent Manager does not affect the Secure Agent status.

    Configuring the Proxy Settings on Windows

    If your organization uses an outgoing proxy server to connect to the internet, the Secure Agent connects to

    the Informatica Cloud application through the proxy server. The Secure Agent installation wizard configures

    the proxy server settings for the Secure Agent based on settings configured in the browser. Configure proxy

    server settings if they change or if they are incorrectly configured by the installation program.

    Contact your network administrator for the correct proxy settings.

    To configure the proxy settings for the Secure Agent on a Windows machine:

    1. To launch the Secure Agent Manager, click Start > All Programs > Informatica Cloud Secure Agent >

    Informatica Cloud Secure Agent.

    If the Secure Agent Manager is active, you can click the Informatica Cloud icon in the Windows taskbar

    notification area to open the Secure Agent Manager.

    The Secure Agent Manager displays the Secure Agent status.

    2. In the Secure Agent Manager, click Proxy.

    3. To enter proxy server settings, click Use a Proxy Server .

    24 Chapter 3: Secure Agents

  • 8/20/2019 IC Spring2015 AdministratorGuide

    25/67

    4. Enter the following information:

    Field Required/

    Optional

    Description

    Proxy Host Required Host name of the outgoing proxy server that the Secure Agent uses.

    Proxy Port Required Port number of the outgoing proxy server.

    User Name Optional User name to connect to the outgoing proxy server.

    Password Optional Password to connect to the outgoing proxy server.

    5. Click OK.

    The Secure Agent Manager restarts the Secure Agent to apply the new settings.

    Configuring a Login for a Windows Secure Agent ServiceOn Windows, you can configure a network login for the Secure Agent service. A login allows the Secure

     Agent to access the network wi th the pr ivileges and permissions associated with the login.

    Configure a login to allow the Secure Agent to access directories to configure and run tasks. When you

    configure or run tasks that use Flat File or FTP/SFTP connection types, the Secure Agent might require

    permissions to read or write information to related directories.

    For example, to browse to a directory to configure a Flat File or FTP/SFTP connection, the Secure Agent

    login might require permission to access the directory. Without a Secure Agent login with the appropriate

    permissions, Informatica Cloud cannot display the directory in the Browse for Directory dialog box.

    To configure a login for a Secure Agent service:

    1. From the Windows Control Panel, click Administrative Tools > Services.2. In the Services window, right-click the Informatica Cloud Secure Agent service and click Properties.

    3. In the properties dialog box, click the Log On tab.

    4. To configure a login, select This Account.

    5. Enter an account and associated password.

    Use an account with the required privileges and permissions for the network security defined for the

    domain. By default, the account format is \.

    6. Click OK.

    7. In the Services window, restart the Secure Agent service for the changes to take effect.

    Uninstalling the Secure Agent on WindowsYou can uninstall the Secure Agent. You might uninstall the Secure Agent if you no longer want to run the

    Secure Agent on the machine or if you want to reinstall the Secure Agent.

    Before you uninstall the Secure Agent, make sure no connections are configured to use it.

    Secure Agent Installation on Windows 25

  • 8/20/2019 IC Spring2015 AdministratorGuide

    26/67

    To uninstall the Secure Agent:

    1. Click Start > All Programs > Informatica Cloud Secure Agent > Uninstall Informatica Cloud Secure

    Agent.

    The Secure Agent uninstaller launches.

    2. Click Uninstall.3. When the uninstall completes, click Done.

    4. Delete any remaining files in the installation directory.

     After you uninstall the Secure Agent, log f iles may stil l exist in the directory where you installed the

    Secure Agent.

    Secure Agent Installation on Linux

    On Linux, the Secure Agent runs as a process. You can use a shell command line to install, register, start,

    stop, and uninstall the Secure Agent. You can also use the shell command line to check the Secure Agent

    status. Once started, the Secure Agent continues to run as a process until stopped.

    Note: A Secure Agent that runs on Linux does not support tasks that contain a Microsoft SQL Server source

    or target.

    When you install a Secure Agent, you perform the following steps:

    1. Ensure the machine on which you run the Secure Agent meets the minimum requirements.

    2. Download the Secure Agent installation wizard.

    3. Install, start, and register the Secure Agent.

    You can perform the following tasks for a Secure Agent:

    • View the Secure Agent status.

    • View the Secure Agent details.

    • View the Secure Agent audit.

    • Edit the Secure Agent.

    • Start and stop the Secure Agent.

    • Configure proxy settings.

    • Delete a Secure Agent.

    • Uninstall the Secure Agent.

    Downloading the Secure Agent Installation Wizard

    Download the Secure Agent installation wizard from Informatica Cloud. You can download and run the

    Secure Agent on any machine that meets the minimum requirements.

    1. Click Configure > Runtime Environments, and then click Download Secure Agent.

    2. Select the operating system on which you will run the Secure Agent, and then click Download.

    3. Save the installation wizard to the machine where you want to run the Secure Agent.

    The name of the Linux Secure Agent installation file is agent_install.bin.

    26 Chapter 3: Secure Agents

  • 8/20/2019 IC Spring2015 AdministratorGuide

    27/67

    Installing and Registering the Secure Agent on Linux

    You can install one Secure Agent on each machine. You must uninstall the existing Secure Agent from the

    machine before you install a new Secure Agent. After the installation completes, start the Secure Agent, then

    use your Informatica Cloud username and password to register the Secure Agent.

    If the organization requires a proxy server to connect to the internet, the installation wizard configures theproxy settings for the Secure Agent based on the proxy settings in the browser. You must configure the proxy

    settings if they change or are incorrectly configured by the installation program.

    To install the Secure Agent on Linux:

    1. In a shell command line, navigate to the directory where you downloaded the file and enter the following

    command:

    agent_install.bin –i console

    The installer completes.

    2. To start the Secure Agent, navigate to the directory where you installed the Secure Agent and enter the

    following command:

    infaagent startup

     After the Secure Agent starts , register the Secure Agent.

    3. To register the Secure Agent, navigate to the following directory:

    /main/agentcore

    4. Enter the following command using your Informatica Cloud username and password:

    consoleAgentManager.sh configure

    You can check the registration status of a Secure Agent using the following command in the same

    directory:

    consoleAgentManager.sh isConfigured

    Configuring the Proxy Settings on Linux

    If your organization uses an outgoing proxy server to connect to the internet, the Secure Agent connects to

    the Informatica Cloud application through the proxy server. The Secure Agent installation wizard configures

    the proxy server settings for the Secure Agent based on settings configured in the browser. If the proxy

    server settings are not set correctly or change, update the proxy server settings defined for the Secure Agent.

    Contact the network administrator to determine the proxy settings.

    To configure the proxy server settings for the Secure Agent on a Linux machine:

    1. Open the following directory:

    \main

    2. Edit the following properties in the proxy.ini file:

    Field Description

    InfaAgent.ProxyHost Host name of the outgoing proxy server that the Secure Agent uses.

    InfaAgent .P roxyPor t Por t number of the outgoing proxy server.

    Secure Agent Installation on Linux 27

  • 8/20/2019 IC Spring2015 AdministratorGuide

    28/67

    Field Description

    InfaAgent.ProxyUser User name to connect to the outgo ing proxy server.

    InfaAgent.ProxyPassword Password to connect to the outgoing proxy server.

    3. Save and close the file.

    4. Restart the Secure Agent.

    Uninstalling the Secure Agent on Linux

    You can uninstall the Secure Agent. You might uninstall the Secure Agent if you no longer want to run the

    Secure Agent on the machine or if you want to reinstall the Secure Agent.

    Before you uninstall the Secure Agent, make sure no connections are configured to use it.

    To uninstall the Secure Agent on Linux:

    1. Open the command line.

    2. Navigate to the directory where you installed the Secure Agent.

    3. Enter the following command in the command line to stop the Secure Agent Linux process:

    infaagent shutdown

    4. To uninstall the Secure Agent, run rm -rf on the directory where you installed the Secure Agent to

    remove Secure Agent files.

    Secure Agent Properties

    You can edit the Secure Agent name, update Secure Agent configuration properties, and add custom

    configuration properties for the Secure Agent. Modify the Secure Agent configuration properties to change or

    optimize Secure Agent behavior.

    For example, to configure the Secure Agent Core to perform a connectivity check every five seconds, you

    can set the maintenance-check-period property to 5.

    You can configure the following types of Secure Agent configuration properties:

    Secure Agent Core

    The following table describes the Secure Agent Core properties that you can configure:

    Secure Agent Core

    Property

    Description

    resource-release-

    waiting-time

    Number of seconds that the Secure Agent Core waits for the Secure Agent

    Manager to exit.

    tomcat-notification-

    period

    Number of seconds that the Secure Agent Core waits for the Apache Tomcat

    process to notify the Secure Agent Core that it is ready.

    28 Chapter 3: Secure Agents

  • 8/20/2019 IC Spring2015 AdministratorGuide

    29/67

    Secure Agent Core

    Property

    Description

    upgrade-check-period Number of seconds that the Secure Agent Core checks for upgrade from the

    server. The minimum value that you can enter is 30 seconds.

    maintenance-check-period

    Number of seconds that the Secure Agent Core waits to perform maintenancechecks.

    waiting-time-for-

    tomcat-shutdown

    Number of seconds that the Secure Agent Core waits for the Apache Tomcat

    process to shut down before aborting it.

    rmi-info-refresh-period Number of seconds that the Secure Agent Core waits to refresh the Java RMIinformation.

    tomcat-check-period Number of seconds that the Secure Agent Core waits to check if the Apache

    Tomcat process is running. Secure Agent Core starts the Apache Tomcat process

    if it is supposed to be running.

    waiting-time-for-jobs-complete

    Number of seconds that the Apache Tomcat process waits for jobs to completebefore shutting down to upgrade the Secure Agent.

    Secure Agent Manager 

    The following table describes the Secure Agent Manager properties that you can configure:

    Secure Agent Manager

    Property

    Description

    start_as_windows_service Indicates whether the Secure Agent Core starts as a Windows service.Use one of the following values:- True. The Secure Agent Core starts as a Windows service.

    - False. The Secure Agent Core starts as a process.

    DTM

    The following table describes the ETL engine properties that you can configure:

    DTM Property Description

     AgentConnect ionTimeout Number of seconds that the Secure Agent communication requests to wa it

    before it times out.

    SalesForceConnectionTimeout Number of seconds that the Salesforce web service requests to wait

    before it times out.

    Note: Configure other DTM properties only when Informatica Global Customer Support instructs you to.

    Secure Agent Properties 29

  • 8/20/2019 IC Spring2015 AdministratorGuide

    30/67

    Apache Tomcat JRE

    The following table describes the Apache Tomcat JRE properties that you can configure:

    Apache Tomcat JRE

    Property

    Description

    JRE_OPTS The JRE VM options for the Apache Tomcat process.

    INFA_MEMORY The JRE VM opt ions tha t are set for vi rtual mach ine memory for the ApacheTomcat process.

    INFA_SSL Configure this property only when Informatica Global Customer Support

    instructs you to.

    Secure Agent Core JRE

    The following table describes the Secure Agent JRE properties that you can configure:

    Secure Agent Core JRE Property Description

    JRE_OPTS The JRE VM options set for the Secure Agent Core.

    Apache Tomcat

    Configure the Apache Tomcat properties only when Informatica Global Customer Support instructs you

    to.

    Secure Agent Core Log4J

    Configure the Secure Agent Core Log4J logging properties only when Informatica Global Customer

    Support instructs you to.

    Apache Tomcat Log4J

    Configure the Apache Tomcat Log4J logging properties only when Informatica Global Customer Support

    instructs you to.

    Secure Agent Manager Log4J

    Configure the Secure Agent Manager Log4J logging properties only when Informatica Global Customer

    Support instructs you to.

    Configuring Secure Agent Properties

    Complete the following steps to edit the Secure Agent details.

    1. Click Configure > Runtime Environments.

    2. On the Runtime Environments page, if necessary, expand the runtime environments to see the list of

    Secure Agents. Click the Secure Agent name from the list.

    3. Click Edit on the View Secure Agents page or select Edit Secure Agent under Actions.

    The Edit Secure Agent page appears.

    4. If you want to change the Secure Agent name, in Agent Name, enter the new name.

    5. To edit a Secure Agent configuration property, in the Type list, select the type.

    The properties associated with the type appear.

    30 Chapter 3: Secure Agents

  • 8/20/2019 IC Spring2015 AdministratorGuide

    31/67

    6. To edit a property value, click the Edit Agent Configuration icon next to the property that you want to

    edit.

    7. To reset the property to the system default, click the Reset Agent Configuration to system default

    icon.

    You can configure properties for the following configuration types:•  Agent Core

    •  Agent Manager 

    • DTM

    •  Apache Tomcat JRE

    •  Agent Core JRE

    8. To add custom properties, complete the following steps:

    a. Select a configuration type.

    b. Choose INFO or DEBUG sub-type to determine logging level.

    c. Enter a name and value.

    9. Click the Add icon or the Delete icon to add or delete properties.

    10. To reset all the configuration properties to the default settings, click Reset All.

    11. Click OK to save your changes.

    Viewing Secure Agent Status and Details

    You can view detailed information about a Secure Agent on the View Secure Agents page. For example,

    you can view the Secure Agent status, Secure Agent audit information, and Secure Agent properties. You

    can also refresh the status of a Secure Agent.

    To view Secure Agent details:

    1. Click Configure > Runtime Environments.The Runtime Environments page lists all Secure Agents for your organization. If necessary, expand the

    runtime environments to see the list of Secure Agents.

    2. Click the name of the Secure Agent that you want to view.

    The View Secure Agent page displays Secure Agent details and version. It also displays the Secure

     Agent package and configuration details.

    3. To refresh the status of the Secure Agent, click Refresh Status.

    View the Secure Agent Status on Linux

    If desired, you can view the Secure Agent status on Linux instead of on the Informatica Cloud View Secure

    Agent page.

    To view the Secure Agent status on Linux:

    1. In a shell command line, navigate to the following directory:

    /main/agentcore

    2. Run the following command:

    consoleAgentManager.sh getstatus

    The command returns the Secure Agent status.

    Secure Agent Properties 31

  • 8/20/2019 IC Spring2015 AdministratorGuide

    32/67

    3. To refresh the status of the Secure Agent, you can repeat Step 2, or you can run the following command:

    consoleAgentManager.sh updatestatus

    You might need to use the updatestatus command if you have intermittent connectivity with the Secure

     Agent.

    View the Secure Agent Audit

    The Secure Agent audit includes start and stop times, server connection and upgrade information.

    You can configure the number of rows displaye