IICS July2024 OrganizationAdministration en
IICS July2024 OrganizationAdministration en
July 2024
Organization Administration
Informatica Intelligent Cloud Services Organization Administration
July 2024
© Copyright Informatica LLC 2021, 2024
This software and documentation are provided only under a separate license agreement containing restrictions on use and disclosure. No part of this document may be
reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC.
U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial
computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such,
the use, duplication, disclosure, modification, and adaptation is subject to the restrictions and license terms set forth in the applicable Government contract, and, to the
extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License.
Informatica, Informatica Cloud, Informatica Intelligent Cloud Services, PowerCenter, PowerExchange, and the Informatica logo are trademarks or registered trademarks
of Informatica LLC in the United States and many jurisdictions throughout the world. A current list of Informatica trademarks is available on the web at https://
www.informatica.com/trademarks.html. Other company and product names may be trade names or trademarks of their respective owners.
Portions of this software and/or documentation are subject to copyright held by third parties. Required third party notices are included with the product.
The information in this documentation is subject to change without notice. If you find any problems in this documentation, report them to us at
[email protected].
Informatica products are warranted according to the terms and conditions of the agreements under which they are provided. INFORMATICA PROVIDES THE
INFORMATION IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT.
Chapter 2: Organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Setting up an organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Organization settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Organization general properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Authentication properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Connection properties storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Fingerprint authentication properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Data Integration service properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
CLAIRE recommendation preferences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Enterprise Data Catalog integration properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Sub-organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Adding a sub-organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Removing a sub-organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Disabling or enabling a sub-organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Switching to a different organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Denying parent organization access to a sub-organization. . . . . . . . . . . . . . . . . . . . . . . . 24
Add-on connectors in sub-organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Exporting and importing assets in sub-organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Additional production organizations and sandbox organizations. . . . . . . . . . . . . . . . . . . . . . . 25
Creating an additional organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Chapter 3: Metering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Informatica processing unit metrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Viewing IPU metrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
IPU scalars. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
IPU meters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
IPU usage by asset location. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Table of Contents 3
IPU usage for disabled and deleted sub-organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . 34
IPU metrics reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Feature-based license metrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Viewing license metrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Viewing usage details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Metering usage reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Chapter 5: Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Rules and guidelines for permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Configuring permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Chapter 6: Schedules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Configuring a blackout period. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Repeat frequency. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Time zones and schedules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
4 Table of Contents
Daylight Savings Time changes and schedules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Configuring a schedule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Exporting schedules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Troubleshooting scheduled tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Table of Contents 5
Preface
Use Organization Administration to learn how to set up and maintain your Informatica Intelligent Cloud
Services℠ organization and sub-organizations. Learn how to manage licenses and monitor license usage,
configure source control, configure object permissions, create schedules, manage bundles, monitor events,
and troubleshoot security issues.
Informatica Resources
Informatica provides you with a range of product resources through the Informatica Network and other online
portals. Use the resources to get the most from your Informatica products and solutions and to learn from
other Informatica users and subject matter experts.
Informatica Documentation
Use the Informatica Documentation Portal to explore an extensive library of documentation for current and
recent product releases. To explore the Documentation Portal, visit https://docs.informatica.com.
If you have questions, comments, or ideas about the product documentation, contact the Informatica
Documentation team at [email protected].
https://network.informatica.com/community/informatica-network/products/cloud-integration
Developers can learn more and share tips at the Cloud Developer community:
https://network.informatica.com/community/informatica-network/products/cloud-integration/cloud-
developers
6
Informatica Intelligent Cloud Services Marketplace
Visit the Informatica Marketplace to try and buy Data Integration Connectors, templates, and mapplets:
https://marketplace.informatica.com/
To search the Knowledge Base, visit https://search.informatica.com. If you have questions, comments, or
ideas about the Knowledge Base, contact the Informatica Knowledge Base team at
[email protected].
Subscribe to the Informatica Intelligent Cloud Services Trust Center to receive upgrade, maintenance, and
incident notifications. The Informatica Intelligent Cloud Services Status page displays the production status
of all the Informatica cloud products. All maintenance updates are posted to this page, and during an outage,
it will have the most current information. To ensure you are notified of updates and outages, you can
subscribe to receive updates for a single component or all Informatica Intelligent Cloud Services
components. Subscribing to all components is the best way to be certain you never miss an update.
To subscribe, on the Informatica Intelligent Cloud Services Status page, click SUBSCRIBE TO UPDATES. You
can choose to receive notifications sent as emails, SMS text messages, webhooks, RSS feeds, or any
combination of the four.
To find online support resources on the Informatica Network, click Contact Support in the Informatica
Intelligent Cloud Services Help menu to go to the Cloud Support page. The Cloud Support page includes
system status information and community discussions. Log in to Informatica Network and click Need Help to
find additional resources and to contact Informatica Global Customer Support through email.
The telephone numbers for Informatica Global Customer Support are available from the Informatica web site
at https://www.informatica.com/services-and-training/support-services/contact-us.html.
Preface 7
Chapter 1
Introducing Administrator
Administrator provides organization management capabilities across Informatica Intelligent Cloud Services.
Configure settings for your organization and sub-organizations such as password requirements, trusted
IP addresses, connection properties storage, time zone and email notification settings for Data
Integration tasks, CLAIRE™ recommendation preferences, and Enterprise Data Catalog settings. Create
and manage sub-organizations.
For information about organizations and sub-organizations, see Chapter 2, “Organizations” on page 11.
Licenses
For information about licenses, see Chapter 10, “Licenses” on page 82.
Metering
View metering information such as job limits, usage, and Informatica processing unit (IPU) balances.
Configure single-sign on settings for Microsoft Azure. Enable single sign-on capability for a SAML third-
party identity provider.
For information about Microsoft Azure single sign-on settings and information about enabling and
configuring SAML single sign-on, see User Administration.
Enable source control for projects, folders, and assets. Configure upgrade error handling and upgrade
restart schedules for some Secure Agent services. Configure custom branding settings for a parent
organization to apply to sub-organizations. Enable and disable the use of customer managed encryption
keys for your organization. Configure your organization to retrieve connection credentials from an
external secrets manager.
For more information about general and security settings, see Chapter 4, “ General and security
settings” on page 45.
Create and configure individual user accounts to allow access to your organization. Create groups of
users that can perform the same tasks. Create and configure roles to define the privileges for your users
and user groups.
8
For information about users, user groups, and user roles, see User Administration.
Permissions
Configure the access rights that users and user groups have for objects such as Secure Agents, Secure
Agent groups, connections, and schedules.
For information about permissions and configuring permissions, see Chapter 5, “Permissions” on page
67.
Runtime environments
Download and install Secure Agents. Create and configure Secure Agent groups.
For information about Secure Agents, Secure Agent groups, and downloading and installing a Secure
Agent, see Runtime Environments.
Use a runtime environment that Data Integration manages to reduce maintenance overhead.
Note: To use a serverless runtime environment, you must have a private cloud on the AWS cloud
platform.
Configure settings for the microservices that the Secure Agent uses for data processing such as the
Elastic Server, CIH Processor, Data Integration Server, EDC Search Agent, and Process Server.
For information about Secure Agent services and their configuration, see Secure Agent Services.
Advanced clusters
Manage the ephemeral clusters that your organization can use to process data integration jobs.
Schedules
Create schedules to run tasks or taskflows at specified times or at regular intervals. Define a blackout
period in which no scheduled tasks or jobs in your organization can run.
For information about schedules and organization blackout periods, see Chapter 6, “Schedules” on page
71.
Add-on bundles
Install, copy, upgrade, and uninstall sets of related mappings, mapping tasks, mapplets, and Visio
templates that Data Integration users can use in data integration projects.
For information about managing add-on bundles, see Chapter 7, “Bundle management” on page 76.
Download out-of-the-box data services that process industry-standard messages and use them to create
custom data services to process custom messages.
For information about the data services repository, see Data Services Repository.
Event monitoring
Monitor events for the assets, licenses, users, and Secure Agents in your organization through the asset
and security logs.
For information about asset and security logs, see Chapter 8, “Event monitoring” on page 79.
9
File transfer
Configure your organization's file server to securely send and receive files from a business partner's
remote server. Configure a connection, and then send the files to your partners using the Informatica
Intelligent Cloud Services REST API.
For information about file servers and file transfer, see File Transfer.
Note: Some of the functionality that's mentioned in the help might not be available due to your organization's
Informatica Intelligent Cloud Services license agreement.
Organizations
An organization is a secure area within the Informatica Intelligent Cloud Services repository that stores your
licenses, user accounts, data integration assets such as mappings and tasks, and information about jobs and
security. You might have access to one or more organizations.
By default, the organization that you create when you start your free trial is a production organization.
Based on your licenses, you might also have access to the following organizations:
Sub-organizations
If you have the appropriate license, administrators in the production organization can create one or more
sub-organizations. Sub-organizations are child organizations of the production organization. They are
automatically linked to the parent organization.
Each sub-organization has its own set of assets, connections, runtime environments, and users.
However, the parent organization can share runtime environments and add-on connectors with a sub-
organization. Administrators in the parent organization can switch to a sub-organization unless the sub-
organization forbids this.
If you have the appropriate license, administrators in the production organization can create additional
production organizations and sandbox organizations.
These organizations are automatically linked to the production organization for IPU usage, but they are
otherwise completely independent organizations. They do not share assets, connections, runtime
environments, or users with the production organization. Administrators in the production organization
cannot switch into an additional production organization or a sandbox organization.
If the production organization has the license to create sub-organizations, administrators in the
additional production organizations and sandbox organizations can create sub-organizations for their
organizations.
The administrator of an organization maintains the organization and its sub-organizations. Log in to
Informatica Intelligent Cloud Services as an administrator to set up your organization, create and manage
schedules, and monitor activities related to assets and security.
11
Setting up an organization
When you set up an organization, you configure the organization properties, sub-organizations, additional
organizations, licenses, runtime environments, and user accounts.
1. Configure organization properties such as the organization name and address, authentication
information, and notification email addresses.
2. Verify that your organization has the appropriate licenses.
3. Optionally, create one or more sub-organizations and configure licenses for the sub-organizations.
4. Optionally, create additional production organizations and sandbox organizations.
5. Configure runtime environments and Secure Agents.
6. Set up users, user groups, and roles.
You might also need to download and install non-native connectors for your organization. For example, if
users in your organization create tasks that read data from Teradata tables, you need to download and install
the add-on connector for Teradata. For more information about downloading and installing add-on
connectors, see Connections.
Organization settings
Configure settings for your organization or sub-organizations on the Organization page. To access the
Organization page, in Administrator, select Organization.
12 Chapter 2: Organizations
You can configure the following settings:
• General properties such as organization name, description, number of employees, and address
information.
• Authentication information and connection properties storage.
• Connection credentials and where they are stored.
• Fingerprint authentication enforcement.
• Data Integration service properties such as the time zone and default addresses for email notifications.
• CLAIRE™ recommendation preferences. If enabled, CLAIRE provides design time recommendations based
on collected metadata.
• Enterprise Data Catalog integration properties such as the URL of the Enterprise Data Catalog Service,
runtime environment that reads data from Enterprise Data Catalog, and Enterprise Data Catalog user
name and password.
Overview information
Property Description
ID ID assigned to your organization when it was created. You cannot change an organization
ID.
Parent When you view a sub-organization, this property displays the ID assigned to the parent
Organization ID organization. You cannot change an organization ID.
Organization When you view a sub-organization, this property indicates whether the sub-organization is
Status enabled or disabled.
Environment Type Environment type for the organization, either Production, QA, Development, or Sandbox.
Informatica Intelligent Cloud Services sets the environment type in the following ways
based on how you create the organization:
- When you create your organization by starting your free trial, the environment type is
Production.
- When you create an additional production organization, the environment type is
Production.
- When you create a sandbox organization, the environment type is Sandbox.
There is no difference in functionality among the environment types.
Organization settings 13
Property Description
MDM Environment MDM environment type for an organization to accurately govern and monitor the usage of
Type the organization.
The MDM environment type can be production, additional production, sandbox, partial
sandbox, trial, partner, or provisional.
Verify the MDM environment type whenever it changes. To update the MDM environment
type, contact Informatica Global Customer Support.
Deny parent When this option is checked, users in the parent organization cannot switch from the
organization parent organization to the sub-organization. Users in the parent organization with the
access to this sub- appropriate privileges can make only the following changes to the sub-organization:
organization - Enable and disable the sub-organization
- Update the sub-organization licenses
- Edit the sub-organization properties such as the organization description and CLAIRE
recommendation preferences
This option is displayed on the Organization page for sub-organizations. This option can be
changed when an administrator in the sub-organization logs in to the sub-organization.
This option is read-only when a parent organization administrator views the organization
properties for the sub-organization.
This option is unchecked by default.
Address information
Use the address properties to specify the street address, zip code, state, and country of the organization.
History information
The organization history information displays the date and time that the organization was created, the
user who created the organization, the date and time that the organization was last updated, and the
user who last updated the organization. Informatica Intelligent Cloud Services updates the history
information when you make changes to the organization.
Authentication properties
You can configure authentication properties for your organization and sub-organizations. Authentication
properties control password restrictions and IP address filtering.
Password restrictions are enforced when users create or change their passwords. If you change the
password expiration date from "never" to a number of days, then users with passwords that are older than the
number of days will be required to change their passwords the next time that they log in to Informatica
Intelligent Cloud Services.
14 Chapter 2: Organizations
The following table describes the authentication properties:
Property Description
Minimum Minimum password length required for a valid password. Must be a number between 4 and 12
Password characters.
Length
Session Idle Amount of time before a user's session times out due to inactivity. Informatica Intelligent Cloud
Timeout Services displays a warning message to the user 60 seconds before the user is logged out.
Default is 30 minutes.
Allowed Trusted The trusted ranges of IP addresses from which users can log in to access the organization.
IP Ranges Informatica Intelligent Cloud Services supports IP address formats in IP version 4 (IPv4) and
version 6 (IPv6).
Fields for the trusted IP address range appear when you enable IP address filtering. To enter
additional address ranges, click +.
Note: If you enter an invalid IP address range, users cannot access your organization. Contact your
network administrator for valid IP address ranges.
Informatica Cloud
When you store connection properties on the cloud, the connection properties are stored in the
Informatica Intelligent Cloud Services repository and are always available. The connections are
encrypted by the Informatica Intelligent Cloud Services key management service.
Organization settings 15
Informatica Intelligent Cloud Services backs up connection properties regularly as part of standard
backup procedures.
You might store connection properties with a local Secure Agent if you need the connection properties to
reside within your firewall. When you enable this option, the properties for all connections that are listed
on the Connections page are stored with the local agent.
Note: In organizations subject to FedRAMP, you can't store connection properties with a local Secure
Agent.
If you choose this option, you can store connection properties with one Secure Agent. Connection
properties are stored in the following directory:
When you store properties with a local Secure Agent, the Secure Agent must be running so that tasks
can run and users can work with connections. Back up connection properties regularly to prevent loss of
data. A best practice is to back up connection properties after you change the location or the encryption
key for connection properties.
The connections are encrypted by the Informatica Intelligent Cloud Services key management service.
Informatica Intelligent Cloud Services uses CBC (Cipher Block Chaining) mode 256 AES encryption to
store the connections.
If you use an external secrets manager like AWS Secrets Manager or Azure Key Vault to store sensitive
connection credentials, you need to set the connection credential storage to Informatica Cloud. When you do
this, sensitive credentials are retrieved from the secrets manager and other connection properties are stored
in the Informatica Intelligent Cloud Services repository. You can't use a secrets manager if you store
connection credentials on a local Secure Agent. For more information about secrets manager configuration,
see “Secrets manager configuration” on page 60.
You can change where you want to store connection properties. When you do this, Informatica Intelligent
Cloud Services moves the connection properties to the appropriate location. For example, your license
expires, so you configure the organization to store connections on the cloud. Informatica Intelligent Cloud
Services moves the connection properties from the local Secure Agent to Informatica Intelligent Cloud
Services.
To set the authentication mode, configure the options in Fingerprint Authentication on the Organization
page.
No authentication check is performed when the Secure Agent starts up. This is the default.
Disable fingerprint enforcement and specify an email address. The email format is checked, but the
validity of the email address isn't verified. Be sure to allow emails from the address
"[email protected]".
16 Chapter 2: Organizations
An authentication check is performed during Secure Agent start up. Any fingerprint mismatch triggers a
notification to the email recipient, but the agent starts up normally.
Set fingerprint enforcement to On and specify an email address. The email format is checked, but the
validity of the email address isn't verified. Be sure to allow emails from the address
"[email protected]".
Any fingerprint mismatch triggers a notification to the email recipient and the Secure Agent log in is
prevented from starting up.
A fingerprint is created the first time a Secure Agent starts up, using device attributes from the agent's host
machine. The data is anonymized and hashed to produce a unique fingerprint. When switching from no
enforcement to any other level of enforcement, the Secure Agent generates a fingerprint the first time it
starts up.
If you reinstall the Secure Agent on the same machine, the fingerprint doesn't change.
The following table summarizes what happens when fingerprint enforcement prevents the Secure Agent from
starting up:
Action Message
Error is logged to agentcore.log "Internal error. Agent <Secure Agent ID> fingerprint is not matching with the
previous stored value for request <Request ID>."
Email notification is sent (if an email "There was a fingerprint mismatch while logging in agent with name <Secure
address was specified) Agent name> for Organization <Organization ID>. The agent was last active
on <Date in UTC>."
Jobs properties
Property Description
Schedule A small amount of time that is added to schedule start times to help prevent server overload at
Offset standard schedule start times. An organization has a single schedule offset that is applied to all
schedules. The schedule offset does not affect the start time of manually started tasks or
taskflows. You cannot change the schedule offset.
Even though it is not displayed in the schedule details, the schedule offset for your organization is
added to the time range configured for all schedules. This ensures that scheduled tasks run as
often as expected. For example, you configure a schedule to run every hour from 8:00 a.m. to
12:00 p.m., and the schedule offset for your organization is 15 seconds. Your schedule runs at
8:00:15, 9:00:15, 10:00:15, 11:00:15, and 12:00:15.
Time Zone Time zone used to display job execution time stamps in email notifications.
Organization settings 17
Default email notifications properties
Configure the default email notifications properties to set the default email addresses to use for job
failure, warning, and success messages. Enter one or more valid email addresses. Separate email
addresses with a comma (,) or semicolon (;).
You can also set email notification properties at the task level. When you set email notifications in a task
or taskflow, Informatica Intelligent Cloud Services sends email to the addresses in the task or taskflow
instead of the addresses configured for the organization.
The default setting for CLAIRE recommendations is "Enabled." When you disable CLAIRE recommendations,
recommendations are disabled for all users within your organization. You can enable or disable
recommendations for your organization at any time.
Enable and disable CLAIRE recommendations for sub-organizations from within the sub-organization.
When you enable CLAIRE recommendations, Data Integration users can disable recommendations for
individual mappings in the mapping designer.
If your organization uses Advanced Integration, enabling CLAIRE recommendations enables the following
features:
• CLAIRE-powered configurations, CLAIRE insights, and CLAIRE recommendations for advanced clusters
• CLAIRE-powered runtime strategies and CLAIRE Tuning for mapping tasks that are based on mappings in
advanced mode
• CLAIRE recommendations for jobs that run mappings in advanced mode
The Enterprise Data Catalog integration properties that you configure for the organization apply to the data
catalog searches that all users in the organization perform. If your organization includes sub-organizations,
you can configure different Enterprise Data Catalog integration properties for the parent organization and for
each sub-organization.
18 Chapter 2: Organizations
The following table describes the Enterprise Data Catalog integration properties:
Property Description
Catalog URL URL of the Enterprise Data Catalog Service. Use the following format:
http://<fully qualified host name>:<port>
Do not append /ldmcatalog at the end of the URL.
Runtime Name of the Secure Agent group that is used to read data from Enterprise Data Catalog.
environment The agents in the group that you select must be able to communicate with Enterprise Data
Catalog. Therefore, the Enterprise Data Catalog host must be in the same network as the agent
machines or it must have the appropriate ports open for communication.
User name Enterprise Data Catalog user account that the Secure Agent uses to access Enterprise Data
Catalog.
This user account must have privileges to view and search for objects in Enterprise Data Catalog
and to perform functions using the Enterprise Data Catalog REST API.
Show the data Shows and hides the Data Catalog page in Data Integration.
catalog
Sub-organizations
If your organization has the appropriate license, you can create one or more sub-organizations within your
organization. Create sub-organizations to represent different business environments within your company.
For example, you might create sub-organizations to represent different clients or different departments in
your organization.
You can create a sub-organization from the production organization, from an additional production
organization, or from a sandbox organization.
When you create a sub-organization, the organization that you use to create a sub-organization becomes the
parent organization. Each sub-organization can have only one parent, and it cannot contain another sub-
organization.
Note: Sub-organizations must reside in the same POD (point of deployment) as the parent organization. In a
CI/CD (continuous integration/continuous deployment) -oriented approach, all sub-organizations receive
feature releases simultaneously, potentially resulting in issues and downtime during the same maintenance
window.
Your organization's license controls the number of sub-organizations that you can create. To increase this
number, contact Informatica Global Customer Support.
You can manage sub-organization licenses individually or you can automatically synchronize them with the parent
organization licenses.
Each sub-organization inherits all feature, connector, and custom licenses from the parent organization
except for the license to create sub-organizations and bundle licenses.
Sub-organizations 19
Based on your organization's licenses, you can manage sub-organization licenses in the either of the
following ways:
• Manage the licenses for your sub-organizations individually. The administrators for the parent
organization can disable, enable, and modify the expiration dates for the licenses for each sub-
organization. Changes to one sub-organization do not affect other sub-organizations.
• Automatically synchronize sub-organizations licenses with the parent license.
Users whom you create in a sub-organization are unique to the sub-organization. They cannot log in to
the parent organization or to other sub-organizations. Only administrators in the parent organization and
users in the parent organization that have sub-organization access privileges can access the parent
organization and all sub-organizations.
Assets such as mappings and tasks are also unique within an organization. Assets are not shared
among sub-organizations or between the parent organization and any sub-organization. If you want to
migrate an asset between organizations, export the asset from one organization and import it into a
different organization.
Administrators in the parent organization can share Secure Agent groups with the sub-organizations.
When you share Secure Agent groups, users in the sub-organizations can run jobs on the Secure Agents
within the group.
Users of a parent organization or sub-organization can use only a Secure Agent that belongs to that
organization or sub-organization. Users of a sub-organization cannot use a Secure Agent that belongs to
the parent organization.
Note: Share a Secure Agent group when all agents in the group run only the Data Integration Server
service. You cannot run other agent services' jobs on a shared Secure Agent group.
For more information about shared Secure Agent groups, see Runtime Environments.
The Bundle Deployment feature lets you push bundles seamlessly from your parent organization to your
sub-organizations. This ensures a smooth and efficient distribution of resources and features across
your organizational structure.
For more information about bundles, see Chapter 7, “Bundle management” on page 76.
IPU (Informatica Processing Unit) consumption metrics for each sub-organization are aggregated and
rolled up to their respective parent organization. This consolidation gives you a clear overview of how
your resources are utilized. The consumption data is consolidated and rolled up within the organizational
hierarchy until it reaches the main production organization.
Users in the parent organization that have privileges to view sub-organizations can switch between
organizations without logging out and logging back in to Informatica Intelligent Cloud Services.
Sub-organizations example
To observe CI/CD best practices, you want to create separate sub-organizations to represent different areas
of your business, such as development, testing, and production. To achieve this, you first create separate
parent organizations for development, testing, and production. Each parent organization should ideally be on
20 Chapter 2: Organizations
a different POD, to safeguard against outages if a POD or organization becomes unavailable. Under each
parent organization, you create sub-organizations that represent different clients or departments.
Using this hierarchy ensures a step-by-step flow of updates and improvements between environments,
beginning with Development, moving to Testing, and concluding in Production. Isolating the environments in
this way reduces the chances of unintended changes impacting other workflow stages.
For OEMs (original equipment manufacturers), the sub-organizations can represent individual clients. The
structure allows the OEM to maintain control and oversee licensing, while allowing the individual clients to
manage their development, testing, and production processes.
For corporations, the sub-organizations can represent different departmental divisions. This structure
simplifies administrative monitoring and allows the parent organization to access assets, processes, and
other resources set up by the departments.
Adding a sub-organization
To add a sub-organization, you can either create a new sub-organization or link existing organizations.
Create a sub-organization.
Log in to the organization that you want to be the parent organization and create a sub-organization. The
new sub-organization is automatically linked to the parent organization.
Creating a sub-organization
The administrator of a parent organization can create a sub-organization.
To create a sub-organization, you must be a native user with the Admin role or a native user with the "Suborg
- create" and "Suborgs - view" privileges.
To create a sub-organization:
Sub-organizations 21
Linking organizations
You can create a sub-organization by linking existing organizations. The organization that you link from
becomes the parent organization and the organization that you link to becomes a sub-organization.
Before you link an organization, you need the organization ID for the organization that you want to link. You
can find this information on the Organization page.
Note: If you link a sub-organization that has a license that the parent organization does not have, then the
sub-organization loses the license.
To link organizations:
Removing a sub-organization
To remove a sub-organization, you can unlink organizations or delete the sub-organization.
An unlinked sub-organization becomes a stand-alone organization. You can link it to a different parent
organization or re-link it to the original parent organization. If you obtain the license to create sub-
organizations for the unlinked organization, you can make it the parent organization for a different sub-
organization.
When you delete a sub-organization, you delete all of the assets and data associated with the sub-
organization. If you have a usage-based license, after deletion, the sub-organization continues to
consume IPUs in the current billing period. For more information, see “IPU usage for disabled and
deleted sub-organizations” on page 34.
22 Chapter 2: Organizations
Unlinking a sub-organization
You can unlink a sub-organization from your parent organization. After you unlink an organization, update the
unlinked organization with the required licenses unless you plan to link it to a different parent organization.
• You have an administrator account with the sub-organization you want to unlink.
• You are an administrator of the parent organization, and the parent organization has the license to create
sub-organizations.
• No asset in the sub-organization that you want to unlink uses a shared Secure Agent group as the runtime
environment. If any asset in the sub-organization uses a shared Secure Agent group as the runtime
environment, update the asset to use a different runtime environment before you unlink the sub-
organization.
Note: This condition does not apply to Application Ingestion and Replication and Database Ingestion and
Replication because Application Ingestion and Replication and Database Ingestion and Replication do not
support shared runtime environments.
To unlink a sub-organization:
Deleting a sub-organization
You can delete a sub-organization. When you delete a sub-organization, you delete all of the associated data.
If you have a usage-based license, the sub-organization's metering information is retained in the parent
organization.
You can delete a sub-organization if you are the administrator of the parent organization.
Sub-organizations 23
Disabling or enabling a sub-organization
If you are the administrator for a parent organization, you can disable or enable a sub-organization.
When you create a sub-organization, the sub-organization is enabled by default. You might want to disable a
sub-organization if you have a separate license agreement with the sub-organization and the license
agreement expires. You can re-enable the sub-organization after you disable it.
You can disable or enable a sub-organization even if the sub-organization administrator blocks parent
organization access to the sub-organization.
Disable a sub-organization
When you disable a sub-organization, the organization exists, but sub-organization users cannot log in to
the sub-organization or access it through the REST API. Scheduled jobs in the sub-organization do not
run.
If you have a usage-based license and you disable a sub-organization, it continues to consume IPUs. For
more information, see “IPU usage for disabled and deleted sub-organizations” on page 34.
Enable a sub-organization
When you enable a sub-organization, sub-organization users can log in to the sub-organization and
access assets and perform tasks based on their user roles. Users with the appropriate privileges can
access the sub-organization through the REST API. Scheduled jobs resume according to their schedules.
Disable or enable a sub-organization on the Sub-Organizations tab of the Organizations page. In the Actions
menu for the sub-organization, select Disable or Enable.
Note: If you switch from a parent organization to a sub-organization, you can't perform the following
operations in the sub-organization:
u From the Organization menu in the upper right corner, select the organization that you want to view.
When you deny access to the sub-organization, users in the parent organization cannot switch from the
parent organization to the sub-organization. Users in the parent organization with the appropriate privileges
can make only the following changes to the sub-organization:
24 Chapter 2: Organizations
• Update the sub-organization licenses
• Edit the sub-organization properties such as the organization description and CLAIRE recommendation
preferences
To deny parent organization access to the sub-organization, log in to the sub-organization as an
administrator. On the Organization page, enable the Deny parent organization access to this sub-
organization option.
Sub-organizations inherit all connector licenses from the parent organization. If a sub-organization should
not use a specific connector, disable the connector license for the sub-organization. For more information
about editing and disabling licenses for a sub-organization, see “Editing sub-organization licenses” on page
84.
• Log in to the sub-organization and export or import assets from within the sub-organization.
• Parent organization administrators can log in to the parent organization, switch to the sub-organization,
and import or export Data Integration assets.
Note: This condition does not apply to taskflows and Application Integration assets.
This is a separate production organization. It functions in the same way as the production organization,
except that you cannot create additional production organizations or sandbox organizations from an
additional production organization.
Sandbox organization
This is an organization that is typically used for asset development and testing. There is no difference in
functionality between a sandbox organization and an additional production organization.
Additional production organizations and sandbox organizations are completely independent of the
production organization and each other. They do not share assets, connections, runtime environments, or
users. However, you can export and import assets between them.
Additional production organizations and sandbox organizations appear on the Additional Organizations tab
of the Organization page in the production organization. The Additional Organizations tab is shown in the
following image:
When you create an additional production organization or a sandbox organization, you must enter the
organization name and a user name for the organization administrator. You can log in to the new
organization using this user account and add other users and assets.
After you create an additional production organization or a sandbox organization, you cannot disable or
delete it, and you cannot unlink it from the production organization. If you need to do this, contact
Informatica Global Customer Support.
Note: Creating additional production organizations or sandbox organizations can incur additional IPU charges
for your organization.
To create an additional organization, you must be a native user with the Admin role or a native user with the
"AdditionalOrg creation" and "AdditionalOrg view" privileges.
26 Chapter 2: Organizations
6. Optionally, enter a description, the number of employees, and the address information.
7. Click Save.
The new organization appears on the Additional Organizations tab, and the status is Enabled.
Informatica Intelligent Cloud Services sends a welcome email for the new organization administrator to
your email address.
8. Log out of the production organization.
9. Click the Confirm Account link in the welcome email, and follow the prompts to activate the account for
the new organization administrator.
When you finish activating the account, Informatica Intelligent Cloud Services logs you in to the new
organization.
After you log in to the new organization, you can add other users and create runtime environments,
connections, and assets.
Metering
You can view metering information for your organization and sub-organizations. View metering information
on the Metering page.
The information on the Metering page depends on your organization's license agreement:
• If you have a usage-based license, the Metering page displays a dashboard that includes the number of
Informatica processing units (IPUs) that you have purchased, have consumed, and have remaining in the
current billing cycle. You can also view meters that show the number of IPUs that you have used for each
service.
• If you have feature-based licenses, the Metering page displays the amounts of computing resources that
your organization uses and has remaining. The page also displays the usage limits set through your
organization’s licenses. The page doesn't mention IPUs since IPUs do not apply to feature-based licenses.
The Metering page displays information as a dashboard or as a table, based on your licenses.
An Informatica processing unit (IPU) is a unit of credit used to pre-pay for using Informatica Intelligent Cloud
Services scalars such as Compute Units and Events Processed. You can monitor your IPU balance and usage
on the Metering page.
28
The following image shows the metering dashboard for an account that's set up for monthly billing periods:
Users with the Admin role receive notification through email when the organization crosses the 25, 50, 75, 95,
and 100% IPU consumption thresholds.
The dashboard shows IPU usage for the organization that you're logged in to and linked organizations such
as sub-organizations, additional production organizations, and sandbox organizations.
• The total number of IPUs entitled, consumed, and remaining in the current billing period.
• An estimate of the number of days remaining before the IPU balance is depleted based on current
usage.
• The IPU usage for the billing period. You can view usage by meter, project, or folder.
If you view the usage by project or folder, you have the option to see historical consumption by asset
location.
• A graph that shows the total IPU usage per day.
To view historical information on IPU consumption, click Historical View and select the number of billing
periods to include.
The Current Billing Period to Date panel includes the following information for most meters:
To view the details for a meter, click on the meter name. The details page shows the current usage by
IPU and scalar, an historical usage graph that shows IPU usage for the selected number of billing
periods, and detailed usage information by date.
IPU Usage
• The total number of IPUs entitled, consumed, and remaining in the current billing period.
• The total number of IPUs consumed in the current reporting period. The reporting period is the
current month.
• The IPU usage for the billing period or reporting period. You can view usage by meter, project, or
folder.
If you view the usage by project or folder, you have the option to see historical consumption by asset
location.
• A graph that shows the total IPU usage per day for the billing period or reporting period.
To view historical information on IPU consumption, click Historical View and select the number of
reporting periods to include.
The Current Billing Period to Date panel includes the following information for most meters:
To view the details for each meter, click the meter name. The details page shows the current usage by
IPU and scalar, an historical usage graph that shows IPU and scalar usage for the selected number of
reporting periods, and detailed IPU usage information by reporting period.
30 Chapter 3: Metering
IPU metrics for multiple organizations
You can view IPU usage information for sub-organizations, sandbox organizations, and additional production
organizations.
You can find the following information for organization meters on the metering dashboard in the Current
Billing Period to Date panel:
Meter Description
Sandbox Displays total IPU usage and consumption by scalar for the sandbox organizations directly
Organizations linked to the organization that you're logged in to.
Includes a link to the details page, which shows details for each sandbox organization.
Sub Organizations Displays total IPU usage and consumption by scalar for the sub-organizations directly linked
to the organization that you're logged in to.
Includes a link to the details page, which shows details for each sub-organization.
Additional Displays total IPU usage and consumption by scalar for the additional production
Production organizations directly linked to the organization that you're logged in to.
Organizations Includes a link to the details page, which shows details for each additional production
organization.
Associated Sub When logged in to the production organization, displays total IPU usage for all sub-
Organizations IPU organizations of sandbox or additional production organizations, along with the rate of 6 IPUs
Usage per sub-organization.
For example, a production organization has two sandbox organizations and one additional production
organization. The sandbox organizations and the additional production organization each have a sub-
organization.
When you log in to the production organization, you can find the following metering information:
• IPU usage, consumption by scalar, and detailed metering data for the production organization.
• Total IPU usage and consumption by scalar for the two sandbox organizations and detailed metering data
for each sandbox organization.
• IPU usage, consumption by scalar, and detailed metering data for the additional production organization.
• Total IPU usage for the sandbox organizations' and additional production organization's sub-
organizations.
When you log in to one of the sandbox organizations, you can find the following metering information:
• IPU usage, consumption by scalar, and detailed metering data for the sandbox organization.
• IPU usage, consumption by scalar, and detailed metering data for the sandbox organization's sub-
organization.
Note: A lag of up to 10 minutes might occur before a linked organization's first IPU usage of the day is
reflected on the production organization's Metering page.
IPU scalars
IPUs are based on scalar values. Appropriate scalars are used for each service.
For example, Data Integration usage is measured by Compute Units, and Cloud Integration Hub usage is
measured by Events Processed.
Events Processed Event Inbound and outbound instances of data accessing an intermediate storage
layer.
Rows Processed Million rows Number of rows processed from underlying database logs.
Objects Processed Thousand objects Number of objects processed during assessment and conversion of
PowerCenter assets to Cloud Data Integration assets.
Qualified Usage Qualified IPUs Percentage of total IPUs used in your organizations that have enabled
customer managed keys.
The value resets at the end of the billing period, rather than resetting daily.
IPU meters
IPU meters are the services and features included with Intelligent Cloud Data Management.
The following table lists the IPU meters and applicable scalars:
32 Chapter 3: Metering
Meter Scalar value
Cloud Data Integration for PowerCenter - Change Data Capture Rows Processed
Cloud Data Integration for PowerCenter - Push Down Optimization Rows Processed
Mass Ingestion Application (for Application Ingestion and Replication) Data Volume
Mass Ingestion Applications - Change Data Capture (for Application Ingestion and Replication) Rows Processed
Mass Ingestion Database (for Database Ingestion and Replication) Data Volume
Mass Ingestion Database - Change Data Capture (for Database Ingestion and Replication) Rows Processed
Mass Ingestion Files (for File Ingestion and Replication) Data Volume
Mass Ingestion Streaming (for Streaming Ingestion and Replication) Data Volume
MDM Data Ingestion and Replication (for Streaming Ingestion and Replication) Data Volume
You can view the usage data by project or by folder and choose a date range to view.
When you log in to the production organization, you can also see the usage by assets in sub-organizations of
sandbox and additional production organizations. To view the project and folder data for a sub-organization,
log in to that sub-organization.
Note the following rules regarding IPU consumption for disabled and deleted sub-organizations:
Disabled sub-organizations
When you disable a sub-organization, the sub-organization continues to consume IPUs for meters that
use the following scalars:
• Records stored
• Organizations
• Qualified Usage
Deleted sub-organizations
After Informatica Global Customer Support completes the deletion process for a sub-organization, the
sub-organization consumes six IPUs in the current billing period and doesn't consume IPUs in
subsequent billing periods. If you delete a sub-organization in Administrator but you don't open a ticket
for Informatica Global Customer Support to complete the deletion process, then the sub-organization
continues to be counted in the Organizations scalar value and continues to consume IPUs.
After a sub-organization is deleted, the parent organization's metering page continues to display the sub-
organization's metering data in historical views.
34 Chapter 3: Metering
IPU metrics reports
You can download a report that includes a summary of IPU usage, IPU usage by asset location, or a report
that includes details for a particular meter.
The IPU usage summary report includes a summary of IPU usage for the production organization and its
sub-organizations, additional production organizations, and sandbox organizations. The report includes
data for the selected billing or reporting periods. The report includes the following data by month for
each meter:
• Scalar utilization
• IPU consumption
• Organization ID and name
Download the IPU summary report from the IPU Usage History page.
The IPU usage detail report includes IPU consumption in the selected billing or reporting periods by
project or folder. In the production organization, the report also includes consumption by its sub-
organizations, additional production organizations, and sandbox organizations. Download the IPU usage
detail report from the Monthly IPU Usage by Tag page.
The table view report includes the information that's currently shown in the table on an IPU meter's
details page. Download a table view report from the overview tab of the IPU meter's details page.
The asset breakdown report includes the information that's shown on an IPU meter's asset breakdown
tab. Download an asset breakdown report from the asset breakdown tab of the IPU meter's details page.
For some meters, you can download a report for an IPU meter that includes service details for a specific
date range. Download a detailed service report from the overview tab of the IPU meter's details page.
To download a report, click the Download icon. The following image shows the Download icon on the IPU
Usage History page:
1. On the Metering page, view the Current IPU Usage chart by project or by folder.
2. Click View Full Tag Breakdown.
The Monthly IPU Usage by Tag page opens.
3. Select whether you want to view data by project or folder.
4. Select the billing periods that you want to include in the report, up to the last 13 billing periods.
5. Click the Download icon.
1. On the Metering page, in the Current Billing Period to Date area, click the meter name.
2. Navigate to the overview tab or the asset breakdown tab based on the type of report you want to
download.
3. Select the billing periods that you want to include in the report.
4. Click the Download icon.
5. If the option to download a detailed service report is available, the Metering Usage Report dialog box
appears when you click the Download icon. Perform one of the following tasks:
• Select the table view report, and then click Export.
• Select the detailed service report, and then select the date range for the report and click Export.
Detailed reports for Data Integration can include the following fields:
Field Description
36 Chapter 3: Metering
Field Description
Task Type Type of task, for example mapping task or replication task.
Folder Name Folder that contains the task. If the task is located directly under the project, this field is blank.
Start Time Time when the job was started. Uses Coordinated Universal Time (UTC).
End Time Time when the job was completed. Uses Coordinated Universal Time (UTC).
Metered Value Processed rows for change data capture and advanced pushdown optimization reports.
Consumed serverless compute units for serverless reports.
Consumed compute hours for all other reports.
The Metering page displays the following views depending on the licensed features:
Dashboard view
If you have the appropriate licenses, the Metering page displays information in a dashboard view.
The detail area for each meter type displays metering information for the month, including resource
amounts remaining, average resource usage per day, and days of usage remaining. To see more detail
for a meter type, you can display a detail chart that shows usage by organization or sub-organization,
date range, and runtime environment.
If you do not have the licenses required to see the dashboard view, the Metering page displays license
metrics in a table. The table lists summary metrics for all meters that apply to your organization, which
is determined by your organization’s editions.
You can also navigate to the License Metrics view for all meters from the summary area in the
dashboard view.
Note: Feature-based licensing is different from IPU-based licensing. IPUs are not used for feature-based
licenses. If your organization uses IPUs, see “Informatica processing unit metrics” on page 28.
To open the License Metrics view from the dashboard view, click All Meters in the Metrics Summary This
Month area. If you do not have the licenses required to see the dashboard view, the License Metrics view is
displayed when you open the Metering page.
The meters that appear in the License Metrics view are determined by the editions that your organization has.
Your organization might also be assigned custom meters. Metering information might not be available for
every edition.
If your organization has multiple editions or uses custom meters, a meter might be displayed multiple times
with different limits. In this case, the least restrictive limit applies. For example, if one edition has a limit of
500 synchronization jobs per day and another edition has a limit of 100 synchronization jobs per day, the 500
job per day limit applies. The In Effect column indicates which limit applies.
The License Metrics view displays the following information for each meter:
Property Description
Metering Name of the meter. For example, the number of synchronization jobs per day, the number of rows
processed by mapping jobs per month, or the total number of replication jobs. For Mass Ingestion, this
column shows the ingestion type: File Ingestion and Replication, Application Ingestion and Replication,
Database Ingestion and Replication, Application Ingestion and Replication - Change Data Capture,
Database Ingestion and Replication - Change Data Capture, and Streaming Ingestion and Replication.
38 Chapter 3: Metering
Property Description
Limit Numeric limit such as the maximum number of jobs or processed rows.
The limit applies to the parent organization and to each sub-organization. For example, if the limit is
100 jobs per day, users in the parent organization can run 100 jobs per day, and users in each sub-
organization can also run 100 jobs per day.
If this field displays -1, there is no limit.
Used The actual number units consumed, such as the number of jobs run or compute hours used, in the
organization or sub-organization during the metering period.
Percent The percentage of units consumed in the organization or sub-organization during the metering period.
Used
In Effect Indicates whether the meter is in effect for the organization or sub-organization.
Meter definitions
The meters that appear in the License Metrics view of the Metering page are determined by the editions that
your organization has.
The following table describes the meters that might be in effect based on your editions:
Meter Definition
Advanced Data Integration Compute units measured in hours for mappings in advanced mode.
Advanced Data Integration with Advanced Serverless compute units measured in hours for mappings in advanced
Serverless mode.
Advanced Data Quality Compute units measured in hours for data quality assets in mappings in
advanced mode.
Advanced Data Quality with Advanced Serverless compute units measured in hours for data quality assets in
Serverless mappings in advanced mode.
CDI Rows Processed Number of rows processed by mappings outside of advanced mode.
CDI-E Compute Hours Deprecated. This meter has been replaced with the Advanced Data
Integration meter.
Daily/monthly incoming API request Number of API access requests per day or per month.
maximum
Data Integration with Advanced Serverless compute units measured in hours for mappings outside of
Serverless advanced mode.
Data Quality Compute units measured in hours for data quality assets in mappings
outside of advanced mode.
Data Quality with Advanced Serverless Serverless compute units measured in hours for data quality assets in
mappings outside of advanced mode.
Mass Ingestion meters For Mass Ingestion Applications, Mass Ingestion Databases, Mass
Ingestion Files, and Mass Ingestion Streaming, the number of gigabytes
(GBs) ingested by application ingestion and replication, database
ingestion and replication, file ingestion and replication, or streaming
ingestion and replication jobs per month.
For Mass Ingestion Applications - Change Data Capture and Mass
Ingestion Databases - Change Data Capture, the number of rows
ingested.
For MDM Data Ingestion and Replication, the number of gigabytes (GBs)
ingested by streaming ingestion and replication tasks run by MDM users
who publish real-time events from MDM SaaS.
Number of PowerCenter jobs per day/ Number of PowerCenter jobs per day or per month.
month
Number of mapping jobs per day/month Number of mapping jobs per day or per month.*
Number of masking jobs per day/month Number of masking jobs per day or per month.
Number of replication jobs per day/month Number of replication jobs per day or per month.
Number of rows processed by Number of rows processed by PowerCenter jobs per day or per month.
PowerCenter jobs per day/month
Number of rows processed by mapping Number of rows processed by mapping jobs per day or per month.*
jobs per day/month
Number of rows processed by masking Number of rows processed by masking jobs per day or per month.
jobs per day/month
Number of rows processed by replication Number of rows processed by replication jobs per day or per month.
jobs per day/month
Number of rows processed by Number of rows processed by synchronization jobs per day or per month.
synchronization jobs per day/month
Number of state sync jobs per day Number of state synchronization jobs per day.
State synchronization jobs include the fetchState and loadState jobs that
you run through the REST API.
Number of synchronization jobs per day/ Number of synchronization jobs per day or per month.
month
Serverless CDI Compute Hours Deprecated. Serverless compute units measured in hours for mappings
outside of advanced mode.
40 Chapter 3: Metering
Meter Definition
Serverless CDI-E Compute Hours Deprecated. Serverless compute units measured in hours for mappings in
advanced mode.
Total Serverless units used Deprecated. Total number of serverless compute units used to run tasks.
Total compute hours used by elastic Deprecated. This meter has been replaced with the Advanced Data
cluster nodes Integration meter.
Total number of agents Total number of Secure Agents, including agents that are stopped. Does
not include the Informatica Cloud Hosted Agent.
Total number of rows processed by Total number of rows processed by PowerCenter jobs.
PowerCenter jobs
Total number of rows processed by Total number of rows processed by mapping jobs.
mapping jobs
Total number of rows processed by Total number of rows processed by masking jobs.
masking jobs
Total number of rows processed by Total number of rows processed by replication jobs.
replication jobs
Total number of rows processed by Total number of rows processed by synchronization jobs.
synchronization jobs
If you run a profile on the Data Integration Server, Informatica records transactions for the profile in the Data
Quality meter. If you run a profile on an advanced cluster, Informatica records transactions for the profile in
the Data Quality Elastic meter.
• If the mapping that contains the transformation runs outside of advanced mode, it consumes Data Quality
compute hours.
• If the mapping that contains the transformation runs in advanced mode, it consumes Data Quality Elastic
compute hours.
When the serverless runtime environment runs a task, the environment creates a virtual machine with
resources based on the number of compute units that the task requests.
The minimum task duration is two minutes. If the task completes in less than two minutes, the serverless
runtime environment consumes two minutes of compute units. After two minutes, compute units are
consumed by the second.
If you cancel the job, the number of consumed compute units is the greater of the following values:
• The time that the job was running before it was canceled
• Two minutes
Metering begins when the task starts running and ends when the task is complete. Metering doesn't include
the time to compile the job or the time to start the cluster.
Metering doesn't take effect if the job fails before the cluster has been created, such as when the job fails to
compile, the cluster fails to start, or you cancel the job before the cluster starts.
• Application Integration
• Application Integration with Advanced Serverless
• Catalog Records
• CDI-E Compute Hours
• Serverless CDI-E Compute Hours
• Serverless CDI Compute Hours
• Data Quality
• Data Quality Elastic
• Data Quality with Advanced Serverless
42 Chapter 3: Metering
• Data Quality Elastic with Advanced Serverless
• Governance Records
• Mass Ingestion Application
• Mass Ingestion Applications - Change Data Capture
• Mass Ingestion Database
• Mass Ingestion Database - Change Data Capture
• Mass Ingestion Files
• Mass Ingestion Streaming
• MDM Data Ingestion and Replication
• PC2CDI Modernization Service Assessment
• PC2CDI Modernization Service Conversion
The following image shows an example of the details page that shows the total usage for each runtime
environment in the last 90 days:
• If your organization has sub-organizations, you can view usage details for the parent organization or for a
sub-organization. You cannot view usage details for a deleted sub-organization.
• You can change the grouping. For example, you can group by runtime environment to see total usage for
each runtime environment or you can view the full table to see usage by date.
• You can change the date range that defines the reporting period, such the current month, last month, last
90 days, or last 6 or 13 months.
• For Application Integration, the report contains execution details of processes, app connections, and
OData APIs. For an Application Integration advanced serverless runtime environment, the report contains
execution details of processes and guides.
44 Chapter 3: Metering
Chapter 4
Based on your organization's licenses, you can configure the following settings:
You can configure source control for your organization to enable version management for projects,
folders, and assets. Configure a connection to the global source control repository for your organization.
You can configure read/write or read-only access to the repository. You can also enable project-level
source control so that users can link source control repositories to specific projects.
If a service that supports rolling upgrades encounters an error during an upgrade, you can specify
whether to continue or stop upgrading the service. For more information, see “Rolling upgrades for
Secure Agent services” on page 53.
You can also configure a restart schedule for services that need to be restarted after minor upgrades. To
configure a restart schedule, select the day of the week and the time to perform the upgrades. For more
information, see “Restart schedule configuration for Secure Agent services” on page 55.
You can configure custom branding settings for your parent organization and apply them to your sub-
organizations. You can also configure custom branding settings for each sub-organization based on your
requirement. The custom branding settings include logo, color theme, and favicon.
When you configure the custom branding settings, Reference 360 service displays the logo and favicon
that you provide.
You can use your own master key to encrypt your organization's encryption keys instead of using
Informatica's master key.
To create and use your own master key, first provision the key in your cloud provider's key management
service and enable cross-account access with Informatica Intelligent Cloud Services. Then, enable the
Enable Customer Managed Keys option on the Security tab and enter the key properties.
For more information, see “Customer managed encryption keys” on page 56.
You can configure your organization to retrieve sensitive connection credentials from an external secrets
manager like AWS Secrets Manager or Azure Key Vault. To configure a secrets manager for your
45
organization, select the Enable Secrets Manager option on the Security tab and enter the connection
details.
To use source control with Informatica Intelligent Cloud Services, you must have the appropriate licenses.
The following table lists the source control repositories that you can use:
GitLab Supported -
Note: You can use cloud-hosted Bitbucket repositories for Data Integration assets.
When you configure source control for an organization, users can apply source control to objects. Objects are
not checked in automatically. Users can apply source control to individual assets or to all assets in a project
or folder. For more information about applying source control to projects, folders, and assets, see the help
system for the appropriate Informatica Intelligent Cloud Services service.
When you configure source control, you configure the connection to a global source control repository for the
organization. You can configure source control for your organization in the following ways:
When you configure read/write access, users in your organization can check in and check out objects,
pull versions of objects, and revert objects to a previous version. Users must check out source-controlled
objects to change them. Users check out objects exclusively, so one user cannot change an object that
is checked out by another user. Users can change objects that are not source-controlled without
checking them out.
You might want to configure read/write access for an organization in which you develop projects and
assets.
When you configure read-only access, users in your organization can pull versions of source-controlled
objects from the repository. However, users cannot check out or check in objects. Users can make
changes to projects, folders, and assets in the organization without checking them out.
You might want to configure read-only access for a test or production organization so that users can test
or run the latest versions of assets.
Warning: When you configure read-only access, users can overwrite source-controlled objects. For
example, user John pulls the most recent version of a source-controlled mapping and changes it. If
another user pulls any version of the mapping later, John's changes are lost. Configure object
permissions and user privileges carefully to prevent users from accidentally overwriting source-
controlled assets in your organization.
You can enable users to specify a branch in the global repository or a different repository for each
project. Using different repository branches for your projects can enable parallel development and
collaboration across teams in the organization.
You can change the repository URL. To do this, you must first unlink all source-controlled assets. Informatica
Intelligent Cloud Services doesn't allow you to change the repository URL if any assets are source-controlled.
If you want to disable source control after you configure it, unlink all objects from source control and then
disable source control for the organization.
You can unlink an object that's checked out by another user if you have the admin role or a user role with the
Force Undo Checkout privilege.
Maintain different source control repositories so that users in one organization do not accidentally overwrite
or change assets in another organization.
If you want the parent organization administrator to be able to perform source control operations in the sub-
organization, configure the Git user account for the parent organization administrator to have access to the
sub-organization's source control repository.
If you use a GitHub repository, you must have a GitHub access application installed on your repository that
allows Informatica Intelligent Cloud Services to perform source control operations on the organization's
GitHub repository. If you don't have this application installed on your repository, you can install it from the
Settings page.
When you use an on-premises repository, ensure that the Secure Agent machine has enough space for the
local copy of the repository and for all subsequent version control operations.
The Secure Agent creates the local repository the first time that a user performs a source control operation,
such as checking in an asset. When it creates the local repository, it copies the branch that stores
Informatica Intelligent Cloud Services assets. It does not copy other branches. Each time a user performs a
source control operation, the agent gets information about the changes from the remote repository to
support the operation.
By default, the Secure Agent creates the local repository in the following directory on the Secure Agent
machine:
You can change the local repository directory by editing the git_local_repository_path property for the
GitRepoConnectApp service on the Secure Agent details page. For more information about changing the
value of this property, see Secure Agent Services.
1. On the Settings page in Administrator, click Edit in the Source Control area.
2. Enable the Enable Source Control option.
3. Optionally, enable the Enable Project Level Source Control option.
When this option is enabled, users can specify a branch in the global repository or a different repository
to use at the project level.
4. Configure the type of access to the source control repository:
• To configure read/write access, enable the Allow Push to Git Repository option.
• To configure read-only access, disable the Allow Push to Git Repository option.
5. To configure access to a cloud-hosted repository, enter the following information:
Option Description
Repository Type Version control system that you use for the organization. You can use one of the following
cloud-hosted systems:
• GitHub
• Microsoft Azure DevOps
• Atlassian Bitbucket (for Data Integration)
Global Git Name of the branch that stores the Informatica Intelligent Cloud Services objects. The
Branch Name branch that you specify must already exist in the repository.
If you do not enter a branch name, Informatica Intelligent Cloud Services sets the branch
name to "master" or "main," based on the name of the default branch in the remote
repository.
Allow OAuth Enable this option to use OAuth to access the repository.
access to Git If you use a GitHub repository, a Git access application that authorizes Informatica Intelligent
Cloud Services access must be installed on the organization's repository. To install the
application, click Install Git Access App at GitHub.
Option Description
Git Branch Name Name of the branch that stores the Informatica Intelligent Cloud Services objects. The
branch that you specify must already exist in the repository.
If you do not enter a branch name, Informatica Intelligent Cloud Services sets the branch
name to "master" or "main," based on the name of the default branch in the remote
repository.
1. In each Informatica Intelligent Cloud Services service that uses the repository, unlink all objects from
source control.
2. In Administrator, open the Settings page and click Edit in the Source Control area.
3. Verify that the Enable Source Control option is enabled.
4. Configure the type of access to the source control repository:
• To configure read/write access, enable the Allow Push to Git Repository option.
• To configure read-only access, disable the Allow Push to Git Repository option.
5. Verify the platform and name of the branch that stores the Informatica Intelligent Cloud Services
objects. For a cloud-hosted repository, verify the OAuth access setting, as well.
6. Enter the new repository URL, for example:
https://github.com/MyGitUser/MyRepositoryName.git
Tip: You can find the repository URL in the following ways based on the repository type:
Atlassian Bitbucket (self- hosted and Open the repository and select Clone.
cloud-hosted)
GitHub (cloud-hosted) Open the repository and select Clone or download > Clone with HTTPS.
GitHub Enterprise (self-hosted) Open the repository and select Code > Clone with HTTPS.
GitLab Self-Managed Open the repository and select Clone > Clone with HTTPS.
Microsoft Azure DevOps (cloud- Open the repository and select Clone.
hosted)
Before you can disable source control for a read-write organization, all assets must be unlinked.
1. In each Informatica Intelligent Cloud Services service that uses the repository, unlink all objects from
source control.
2. In Administrator, disable source control:
a. In Administrator, open the Settings page.
b. Click Edit in the Source Control area.
c. Disable the Enable Source Control option.
d. Click Save.
3. Optionally, have users in the organization delete their source control credentials in their user settings:
a. In the top right corner of the Informatica Intelligent Cloud Services window, click the User icon and
select Settings.
b. Clear the source control credentials.
c. Click Save.
Your credentials can include a personal access token or app password, depending on the repository service
that you use.
If your administrator has configured the organization's repository for OAuth access, you can enable OAuth
access instead of providing a personal access token or app password.
Personal access tokens and app passwords must be configured to enable full control of private repositories.
For information about generating personal access tokens, see the GitHub or Azure DevOps Git help. For
information about generating app passwords, see the Bitbucket help.
In Informatica Intelligent Cloud Services, perform the following steps to configure access to the repository:
1. Click the User icon in the top right corner of the Informatica Intelligent Cloud Services window and then
select Settings.
2. Perform one of the following tasks:
• Enter your repository credentials.
• Enable OAuth access to the repository. For GitHub and Azure DevOps Git repositories, if you have not
already authorized access, a Git access app appears. Select to authorize access for Informatica
Intelligent Cloud Services.
3. Click Save.
Setup guidelines
Adhere to the following guidelines when you set up source control for your organization:
Development guidelines
Adhere to the following guidelines as you develop and work with assets:
• Create connections and runtime environments before you pull assets from the repository.
When required connections and runtime environments exist in the target organization, you can run
tasks immediately after you pull them from the repository.
• Ensure that reusable assets such as mappings and components are present in the repository before
you use them.
Informatica Intelligent Cloud Services does not allow you to save an asset such as a mapping task
when the dependent mapping does not exist in the organization.
Use the following guidelines when you check in and check out assets:
• When you rename or move an asset, check out the asset's first-level dependent assets and include
them in the same check-in.
For example, if you want to rename a mapping that a mapping task uses, and the mapping task is
used in a taskflow, check out the mapping and the mapping task. You don't need to check out the
taskflow. After you rename the mapping, check in the mapping and the mapping task in one check-in
action.
• Enter comments when you check in assets.
When you check in assets, you might enter a release tag name in the Summary field and enter more
descriptive comments in the Description field. When you do this, the Git Summary field in Informatica
Intelligent Cloud Services shows the release tag that is associated with the asset.
• When you check in multiple assets at one time, limit the number of assets to 1000 or fewer.
Checking in more than 1000 assets at one time can degrade performance between Informatica
Intelligent Cloud Services and the Git repository service.
When you undo a checkout, the object reverts to the last version in the source control repository. The object's
version history will not include a record of the checkout and undo checkout actions. If you think you might
need the changed version later, make a copy of the object before you undo the checkout.
An undo action is not recursive. If you undo the checkout of a project or folder, the lock for the project or
folder is released but the objects within the project or folder remain locked.
1. Open the service in which the user checked out the object.
2. On the Explore page, navigate to the object.
3. In the row that contains the object, click Actions and select Undo Check Out.
The undo action releases the lock so that the object is available for checkout.
Note: If an object was moved or renamed after it was checked out, undoing the checkout will restore the
object's name and location to its name and location before it was checked out.
• Process Server
Example
Your organization uses the following runtime environments:
Agent B1 runs Data Integration Server, Mass Ingestion, and Process Server.
Agent B2 runs Data Integration Server, Mass Ingestion, and Process Server.
When your organization is upgraded, Secure Agent groups A and B are upgraded simultaneously. Within each
Secure Agent group, Process Server is upgraded sequentially. Therefore, while Process Server is being
upgraded on agents A1 and B1, it remains up and running on agents A2 and B2. When the upgrade finishes
on agents A1 and B1, Process Server is upgraded on agents A2 and B2.
Data Integration Server and Mass Ingestion do not support rolling upgrades. In groups A and B, Data
Integration Server is upgraded on each agent simultaneously. In group B, Mass Ingestion is upgraded on
agents B1 and B2 simultaneously.
If an error occurs while a service is being upgraded, the service stops with an error on the agent in which
it encountered the error. The upgrade then continues on the other agents within the group.
Warning: If you enable this option and the error occurs on all agents in the group, the service stops
running on the Secure Agent group. This can cause job interruptions.
If an error occurs while a service is being upgraded, the service stops with an error on the agent in which
it encountered the error. Upgrade of the service stops for all other agents in the group that have not
already been upgraded. The agents that have not been upgraded continue to run the previous version of
the service.
To configure the error handling behavior, click Edit in the Upgrade Settings for Secure Agent Services area,
select the appropriate option, and click Save.
When you configure a restart schedule, you select the day of the week and time in which to restart the
services. For example, you might schedule the restarts for Sundays at 00:00 GMT.
You can configure a restart schedule for the Process Server service. To configure the restart schedule,
perform the following steps:
• The file size for logo and favicon images must be less than 1 MB.
• The maximum size of logo images must be 80 x 325 pixels. The recommended size is 48 x 325 pixels.
• When you upload a logo image, the image is placed within the outlined region. Use the zoom control
option to resize the image so that the image fits in the outlined region.
• The maximum size of favicon images must be 196 x 196 pixels. The recommended size is 32 x 32 pixels.
1. On the Settings page in Administrator, click Edit in the Custom Branding area.
2. Select Enable Custom Branding.
3. If you want the sub-organizations to inherit the branding configuration from the parent organization,
select Sub-Organizations inherits custom branding.
4. To update a logo image, click Upload and select the logo file. For more information about the logo
guidelines, see “Logo and favicon guidelines” on page 55.
5. To update a favicon image, click Upload and select the favicon file. For more information about the
favicon guidelines, see “Logo and favicon guidelines” on page 55.
6. Select the color theme to match the logo and favicon. You can also create a theme.
7. Preview and verify the changes in the Preview section before applying the custom branding settings.
8. Click Save.
By default, Informatica Intelligent Cloud Services protects your organization's sensitive data in the cloud
using organization-specific encryption keys that are generated and stored in the Informatica Intelligent Cloud
Services key management service (KMS). To prevent malicious access, the keys are encrypted using a
master key that is stored in the cloud provider's KMS. The master key is provisioned in Informatica's KMS
account and varies by POD.
If you prefer, you can create a customer managed key (CMK). When you create a CMK, you control access to
it. However, you'll need to grant Informatica Intelligent Cloud Services access to the CMK so that it can
encrypt and decrypt your organization's sensitive data.
1. Informatica Intelligent Cloud Services interfaces with the Informatica Intelligent Cloud Services KMS agnostically.
2. Non-customer managed keys go to Informatica's cloud KMS.
You can create and enable a CMK when you use the following cloud providers' key management services:
Note: When you create a CMK, your KMS and Informatica Intelligent Cloud Services POD must use the same
cloud provider. For example, if your Informatica Intelligent Cloud Services POD is USW1 on AWS, then you
must store your CMK in AWS KMS. You can't store it in Google Cloud KMS or Azure Key Vault.
Note: The steps you perform to create and enable a CMK vary based on your cloud provider. For specific
instructions, see the following H2L articles:
• Enable Customer Managed Keys for your Organization on Amazon Web Services
• Enable Customer Managed Keys for your Organization on Microsoft Azure
• Enable Customer Managed Keys for your Organization on Google Cloud
In general, you perform the following steps:
1. In your cloud KMS, provision the key and enable cross-account access with Informatica Intelligent Cloud
Services.
2. In Administrator, open the Security tab on the Settings page, enable the Enable Customer Managed Keys
option, and enter the key properties.
Note: To perform this step, you must log in to Informatica Intelligent Cloud Services with a user account
that has both the Admin and Key Admin roles.
You can test the key after you configure the key properties. It can take up to 24 hours for the key to
become active.
After you create and enable a CMK, you can revoke it at any time by disabling the Enable Customer Managed
Keys option on the Security tab. When you do this, you'll go back to using Informatica's master key.
When I clicked Test Managed Key in on the Settings page, the test failed. What should I do?
If you get an error when testing the key, perform the following checks:
• In Administrator, verify that the key settings on the Settings page match the settings for the CMK in your
cloud KMS.
• In your cloud KMS, verify that the status of the CMK is active.
• In your cloud KMS, verify that the permissions on the CMK allow Informatica cryptographic access to the
key.
Informatica Intelligent Cloud Services detects key rotation in Azure Key Vault and Google Cloud KMS. When
the CMK is rotated, Informatica Intelligent Cloud Services decrypts your organization's keys using the old
CMK and then encrypts them using the new CMK.
1. On the Settings page in Administrator, click the Security tab and note the Key ARN and Role ARN.
2. Disable the Enable Customer Managed Keys option.
3. Enable the Enable Customer Managed Keys option, reenter the key ARN and role ARN, and click the save
icon.
Note: Be sure to keep the old version of the CMK in your cloud KMS active until you update the key details in
Administrator.
You can delete the old version of the CMK in your cloud KMS after you update the key details on the Settings
page.
When you do this, be sure to keep the current version of the CMK in your cloud KMS active. If the CMK is not
active, disabling customer managed keys fails.
When you disable this option, your organization's encryption keys are once again encrypted using encryption
keys that are managed by Informatica. It can take up to 10 minutes for the Informatica encryption keys to
become active.
You can disable or delete the CMK in your cloud KMS after you disable the Enable Customer Managed Keys
option in Administrator.
Warning: Deleting the CMK in your cloud KMS results in permanent loss to any encrypted data in Informatica
Intelligent Cloud Services and causes the jobs that use the data to fail.
If you need to replace the CMK, perform the following steps so that you don't lose access to the encrypted
data and jobs don't fail:
1. In Administrator, open the Settings page, click the Security tab, and disable the Enable Customer
Managed Keys option.
2. In your cloud KMS, delete the CMK.
3. In your cloud KMS, create a new CMK.
4. On the Settings page in Administrator, re-enable the Enable Customer Managed Keys option and enter
the details for the new CMK.
Can I delete the CMK if I don't want Informatica to access any of my encrypted data?
Warning: Deleting the CMK in your cloud KMS results in permanent loss to any encrypted data in Informatica
Intelligent Cloud Services and causes the jobs that use the data to fail.
If you're sure that you want Informatica to forgo all access to your encrypted data in Informatica Intelligent
Cloud Services, you can delete the CMK in your cloud KMS.
• You retain complete control of your sensitive connection credentials like passwords, OAuth tokens, and
API shared secrets.
• You can manage secrets across multiple environments instead of on a per-application basis.
• You can rotate secrets on your schedule without affecting your connections, mappings, or tasks in
Informatica Intelligent Cloud Services.
When you enable your organization to use a secrets manager, your Secure Agents can dynamically access
sensitive connection credentials from the secrets manager. You can configure one secrets manager for each
organization or sub-organization.
Configure a secrets manager for your organization or sub-organization on the on the Security tab of the
Settings page, as shown in the following image:
To configure your organization to use a secrets manager, you must have the Admin role or the SMS Manage
Connection and SMS View Connection feature privileges as well as sufficient privileges to access the
Administrator service. The organization must also be configured to store connection credentials on the
cloud. You can't use a secrets manager if your organization stores connection credentials on a local Secure
Agent.
After you configure a secrets manager for your organization, you can configure your connections to use the
secrets manager. You can also choose which secrets to store and retrieve.
Note: If you configure a secrets manager, all connections must be created and edited in Administrator. You
can't create and edit connections when you configure mappings and tasks in Data Integration.
In AWS Secrets Manager, secret names can contain only alphanumeric characters and the following
special characters:
/ _ + = . @ - "
In Azure Key Vault, secret names can only contain alphanumeric characters and dashes.
In HashiCorp Vault, secrets must be in either of the following formats based on the secrets engine
version:
Note: Because a colon is used to separate the secret path from the key, Informatica Intelligent Cloud
Services can't process keys that have a colon in the path.
For more information about restrictions on secret names and formats, see the documentation for your
secrets manager.
Note: To use role-based authentication, the Secure Agent must be installed in an EC2 instance.
Role-based authentication
Configure the following properties when you access Secrets Manager using role-based authentication:
Property Description
Authentication Authentication type that the Secure Agent should use to access Secrets Manager. For role-based
Type authentication, choose Role Based Access.
IAM Role Amazon Resource Name (ARN) of the IAM role that the Secure Agent should use to access
secrets. Typically, the format is:
arn:aws:iam::<account>:role/<role-name-with-path>
The IAM role that you specify must be assigned an access policy with the GetSecretValue and
ListSecrets permissions.
For more information about setting up IAM roles on EC2, see the AWS documentation.
Region Region code for the region where your Secrets Manager secrets are hosted, for example, us-
east-2.
Don't enter a full region name like US East (Ohio).
Property Description
Authentication Authentication type that the Secure Agent should use to access Secrets Manager. For access
Type key authentication, choose Access Key.
Access Key ID AWS access key ID that the Secure Agent should use to access secrets, for example,
AKIAIOSFODNN7EXAMPLE.
The access key ID must be associated with an IAM role that is assigned an access policy with
the GetSecretValue and ListSecrets permissions.
You need to enter both the access key ID and the secret access key.
Secret Access Key AWS secret access key that the Secure Agent should use to access secrets, for example
wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY.
You need to enter both the access key ID and the secret access key.
Region Region code for the region where your Secrets Manager secrets are hosted, for example, us-
east-2.
Don't enter a full region name like US East (Ohio).
For more information about AWS Secrets Manager properties, see the AWS documentation.
Property Description
Client ID Application (client) ID that the Secure Agent should use to connect to your key vault.
The client ID is the unique application (client) ID assigned to your app by Azure AD when it was
registered.
Tip: You can find your application (client) ID in your Azure subscription in Azure Active Directory >
Enterprise applications > Application (client) ID.
The application (client) that you specify must have the Get and List permissions for secrets.
Client Secret Secret string that the Secure Agent uses to prove its identity when requesting access to the key vault.
Tenant ID Azure Active Directory (tenant) ID that should be used for authenticating requests to the key vault.
Vault URI URI of the key vault that stores the connection credentials.
For more information about Azure Key Vault properties, see the Azure documentation.
Property Description
Role ID ID of the AppRole that the Secure Agent should use to authenticate with Vault.
The AppRole must have the read and list permissions for secrets.
Secret ID Secret ID of the AppRole that the Secure Agent should use to authenticate with Vault.
Vault URI URI of the key vault that stores the connection credentials, for example:
https://my-hashicorp-vault-12343a56.a1b2345c.z1.hashicorp.cloud:8200
For more information about HashiCorp Vault properties, see the HashiCorp documentation.
4. Select the secrets manager that you use, either AWS Secrets Manager or Azure Key Vault.
5. Enter the connection details such as the vault URI, authentication type, and region.
6. Test the connection.
When you test the connection, you need to select a runtime environment. The runtime environment you
select must contain a local Secure Agent that runs the SecretManagerApp service. The Hosted Agent,
serverless agents, and cloud-hosted agents can’t connect to an external secrets manager.
When the connection is successful, you can configure connections to use the secrets manager.
To disable the use of a secrets manager, clear the Enable Secret Vault option. However, you'll first need to
disable the Use Secret Vault option in all connections.
Note: If you use a secrets manager, you need to create or edit connections in Administrator. You can't create
and edit connections when you configure mappings and tasks in Data Integration.
Permissions
Permissions determine the access rights that a user has for a Secure Agent, Secure Agent group, connection,
schedule, or asset. Permissions add additional or custom security for an object. Permissions define which
users and groups can read, update, delete, execute, and change permissions on the object.
To configure permissions on an object, you need the following licenses and privileges:
• To configure permissions at the project level for all assets in a project, your organization must have the
Set/Unset Security Permissions at Project Level license.
• To configure permissions at the folder level for all assets in a folder, your organization must have the Set/
Unset Security Permissions at Folder Level license.
• To configure permissions on individual assets, your organization must have the Fine Grained Security
license.
• The role assigned to your user account or to a group in which you are a member must have the Set
Permission privilege for the object type. For example, to configure permissions on a Secure Agent, you
must be assigned a role that has the Set Permission privilege for Secure Agents.
To configure permissions on an object, navigate to the object and set the appropriate permissions. For
example, you want only users in the Development Team user group to have access to assets in the
Development Data folder. Navigate to the folder, edit the permissions, and grant the Development Team user
group permissions on the folder.
Permissions apply to the objects that you configure but not to copies of the object. Therefore, when you copy
or export an asset, the permissions are not copied or exported with the asset. For example, you export a
mapping task in which only user rjones has execute permission. When you import the mapping task, the
imported mapping has no permissions assigned to it. Therefore, any user with privileges to run mapping
tasks can run the imported task.
Permission Description
67
Permission Description
Note: These permissions control permissions within Informatica Intelligent Cloud Services. They do not
control operating system permissions, such as the ability to start, stop, or configure the Secure Agent on
Windows or Linux.
• When you configure permissions on an object, verify that the user or group to which you grant
permissions is assigned a role with the appropriate privileges for the object type.
• For example, if you grant a user with the Service Consumer role Update privilege on a particular folder, the
user cannot update the folder because the Service Consumer role does not have update privileges for
folders.
• To edit an asset, the user must have read permission on all assets used within the asset. For example,
when you assign a user Read and Update permissions on a synchronization task, verify that the user also
has Read permission on the connections, mapplets, schedules, and saved queries that are used in the
task.
• To run a subscription or a publication that executes a mapping task, the user must have the Update
privilege for the project and folder that contains the mapping task.
• When a user edits a task, assets without Read permission are not displayed. To avoid unexpected results,
the user should cancel all changes and avoid editing the task until the user is granted the appropriate
Read permissions.
• When configuring a taskflow, a user needs Execute permission on all tasks to be added to the taskflow.
• To edit a taskflow, a user needs Execute permission on all tasks in the taskflow. Without Execute
permission on all tasks, the user cannot save changes to the taskflow.
• To run a taskflow, a user needs Read and Execute permissions on taskflows.
• To monitor jobs or to stop a running job, a user needs Execute permission on the mapping, task, or
taskflow.
• If you assign custom permissions to a Data Integration task and invoke the Data Integration task through
an Application Integration process or a guide, you must complete either of the following tasks:
- Give the Application Integration anonymous user permission to run the associated Data Integration
asset.
- Add the Application Integration anonymous user to a user group that has permission to run the
associated Data Integration asset.
68 Chapter 5: Permissions
Configuring permissions
You can configure permissions on an object if you are assigned a role with the Set Permission privilege for
the object type. For example, to configure permissions on a folder, you must be assigned a role that has the
Set Permission privilege for folders.
Configuring permissions 69
b. If the group does not appear in the Groups list, click Add, and select a group.
c. Enable or disable the appropriate permissions on the group.
Note: When you grant any group permissions on the object, Informatica Intelligent Cloud Services also
adds you as a user with permissions on the object. This prevents you from losing access to the object
when you configure permissions.
5. To remove all permissions restrictions for the object, remove all users and groups from the Permissions
dialog box.
When you remove all users and groups, any user with appropriate privileges for the object type can
access the object.
6. Click Save.
70 Chapter 5: Permissions
Chapter 6
Schedules
You can create schedules to run tasks or taskflows at specified times or at regular intervals. You can also
define a blackout period during which scheduled tasks or jobs do not run.
Create schedules and configure blackout periods on the Schedules page in Administrator. After you create a
schedule, you can associate it with tasks and taskflows in another service such as Data Integration.
When you create a schedule, you specify the date and time. You can configure a schedule to run associated
assets throughout the day between 12:00 a.m. and 11:55 p.m. Informatica Intelligent Cloud Services might
add a small schedule offset to the start time, end time, and all other time configurations. As a result,
scheduled tasks and taskflows might start later than expected. For example, you configure a schedule to run
hourly until noon, and the schedule offset for your organization is 10 seconds. Informatica Intelligent Cloud
Services extends the end time for the schedule to 12:00:10 p.m., and the last hourly task or taskflow starts at
12:00:10 p.m. To see the schedule offset for your organization, check the Schedule Offset organization
property for the Data Integration Service.
To associate a schedule with a task or taskflow, edit the task or taskflow. For example, to associate a
schedule with a mapping task, edit the mapping task in Data Integration, and select the schedule on the
Schedules page.
When you copy a task or taskflow that includes a schedule, the schedule is not associated with the new
asset. To associate a schedule with the new asset, edit the asset.
You can monitor scheduled tasks from the All Jobs page in Monitor. Scheduled tasks do not appear on
the My Jobs page.
Export a schedule
You can export a schedule from your organization and import it into another organization. Export a
schedule on the Schedules page. If the schedule is associated with a task or taskflow, the task or
taskflow is not included in the export file.
Delete a schedule
Note: You cannot delete a schedule that is used in a task or taskflow. Remove the schedule from all
tasks and taskflows before you delete the schedule.
71
Configuring a blackout period
A blackout period prevents all scheduled tasks and taskflows in the organization from running during a
specified period of time. You can configure a blackout period during which the scheduled Data Integration
and Data Ingestion and Replication file publications and file subscriptions don't run. You can also configure
one blackout period for an organization.
If a task is scheduled to run during a blackout period, the task instance will not be started during the blackout
period, and it will not restart automatically when the blackout period ends. After the blackout period, task
instances will resume according to the schedule. If a task is already running when a blackout period starts, it
will not be stopped.
To configure a blackout period, in Administrator, select Schedules, and then click Blackout Period. The
blackout period is displayed on the Schedules page.
Repeat frequency
The repeat frequency determines how often tasks run. You can set the repeat frequency to every N minutes,
hourly, daily, weekly, biweekly, or monthly.
Option Description
Every N Tasks run on an interval based on a specified number of minutes. You can configure the following
minutes options:
- Repeat frequency. Select a frequency in minutes. Options are 5, 10, 15, 20, 30, 45.
- Days. Days of the week when you want tasks to run. You can select one or more days of the week.
- Time range. Hours of the day when you want tasks to start. Select All Day or configure a time range.
You can configure a time range between 00:00-23:55.
- Repeat option. The range of days when you want tasks to run. You can select Repeat Indefinitely or
configure an end date and time.
Hourly Tasks run on an hourly interval based on the start time of the schedule.
You can configure the following options:
- Repeat frequency. Select a frequency in hours. Options are 1, 2, 3, 4, 6, 8, 12.
- Days. Days of the week when you want tasks to run. You can select one or more days of the week.
- Time range. Hours of the day when you want tasks to start. Select All Day or configure a time range.
You can configure a time range between 00:00-23:55.
- Repeat option. The range of days when you want tasks to run. You can select Repeat Indefinitely or
configure an end date and time.
Daily Tasks run daily at the start time configured for the schedule.
You can configure the following options:
- Repeat frequency. The frequency at which you want tasks to run. Select Every Day or Every Weekday.
- Repeat option. The range of days when you want tasks to run. You can select Repeat Indefinitely or
configure an end date and time.
72 Chapter 6: Schedules
Option Description
Weekly Tasks run on a weekly interval based on the start time of the schedule.
You can configure the following options:
- Days. Days of the week when you want tasks to run. You can select one or more days of the week.
- Repeat option. The range of days when you want tasks to run. You can select Repeat Indefinitely or
configure an end date and time.
If you do not specify a day, the schedule runs regularly on the same day of the week as the start date.
Biweekly Tasks run every two weeks based on the start time of the schedule.
You can configure the following options:
- Days. Days of the week when you want tasks to run. You can select one or more days of the week. You
must select at least one day.
- Repeat option. The range of days when you want tasks to run. You can select Repeat Indefinitely or
configure an end date and time.
If you configure a biweekly schedule to start at 5 p.m. on a Tuesday and run tasks every two weeks on
Mondays, the schedule begins running tasks on the following Monday.
Monthly Tasks run on a monthly interval based on the start time of the schedule.
You can configure the following options:
- Day. Day of the month when you want tasks to run. You can configure one of the following options:
- Select the exact date of the month, between 1-28. If you want the task to run on days later in the
month, use the <n> <day of the week> option.
- Select the <n> <day of the week>. Options for <n> include First, Second, Third, Fourth, and Last.
Options for <day of the week> includes Day, and Sunday-Saturday.
Tip: With the Day option, you can configure tasks to run on the First Day or the Last Day of the month.
- Repeat option. The range of days when you want tasks to run. You can select Repeat Indefinitely or
configure an end date and time.
When you create a schedule, you select the time zone for the scheduler to use. You can select a time zone
that is different from your time zone or your organization time zone.
When Daylight Savings time goes into effect, tasks scheduled to run between 2:00 a.m. and 2:59 a.m., do not
run the day that the time changes from 2:00 a.m. to 3:00 a.m. If a task is scheduled to run biweekly at 2 a.m.,
it will run at 3 a.m. the day of the time change and at 2 a.m. for the next run.
Tip: To ensure that Informatica Intelligent Cloud Services does not skip any scheduled runs near the 2 a.m.
time change, do not schedule jobs to run between 12:59 a.m. and 3:01 a.m.
Configuring a schedule
Configure a schedule on the Schedules page. For mapping tasks and synchronization tasks, you can also
create a new schedule when you configure the task. You can configure a schedule to run once or at a specific
interval and to run indefinitely or until a specified end time.
Property Description
Time Zone Select the time zone for the schedule to use. The time zone can differ from the organization
time zone or user time zone.
Repeats Repeat frequency for the schedule. Select one of the following options:
- Does Not Repeat
- Every N Minutes
- Hourly
- Daily
- Weekly
- Biweekly
- Monthly
Default is Does Not Repeat.
4. Click Save.
74 Chapter 6: Schedules
Exporting schedules
You can export schedules from your organization and import them into other organizations. Assets that are
associated with the schedules are not included in the export file. Export schedules on the Schedules page.
After you import schedules, you can associate them with assets in the target organization.
To resolve this issue, change the schedule to allow the task to complete before starting the next task run.
Exporting schedules 75
Chapter 7
Bundle management
A bundle is a set of related mappings, mapping tasks, mapplets, and Visio templates that Data Integration
users can use in data integration projects. Data Integration users design, create, and publish bundles.
Administrators manage bundles.
If you are the administrator for an organization, you can perform the following actions to manage bundles:
Install a bundle.
You can install a public, private, or unlisted bundle that the bundle designer has configured to be used as
a reference. When you install a bundle, the bundle is installed into the Add-On Bundles project in Data
Integration. Users in your organization can use the assets in the bundle, but they cannot edit the assets.
Copy a bundle.
You can copy a public, private, or unlisted bundle that the bundle designer has configured for copying.
When you copy a bundle, you select the Data Integration folder where you want to copy the bundle
contents. You can copy a bundle multiple times and save the contents into a different project or folder
each time that you copy it. After you copy a bundle, users in your organization can edit the assets.
Upgrade a bundle.
If you installed a bundle and a newer version of the bundle is available, you can upgrade the bundle to
get the latest version.
Uninstall a bundle.
If your organization no longer needs an installed bundle, you can uninstall it.
To view the bundles that are installed or are available to your organization, in Administrator, select Add-On
Bundles. The Add-on Bundles page displays information about installed bundles, copied bundles, and
bundles that are available for installation or copying.
For information about bundle types, creating bundles, or publishing bundles, see Mappings in the Data
Integration service help.
Installing a bundle
You can install a public, private, or unlisted bundle that the bundle designer has configured to be used as a
reference. Install a bundle on the Available Bundles tab of the Add-On Bundles page.
Before you install an unlisted bundle, get the bundle access code. To get the access code for a bundle that
was created in your organization, open the Bundles page in Data Integration, click the bundle name, and then
76
click Copy Access Code. To get the bundle access code for a bundle that was created outside of your
organization, contact the bundle publisher.
Copying a bundle
You can copy a public, private, or unlisted bundle that the bundle designer has configured for copying. Copy a
bundle on the Available Bundles tab of the Add-On Bundles page. Each time you copy a bundle, an event is
logged on the Copied Bundles tab.
Before you copy an unlisted bundle, get the bundle access code. To get the access code for a bundle that
was created in your organization, open the Bundles page in Data Integration, click the bundle name, and then
click Copy Access Code. To get the bundle access code for a bundle that was created outside of your
organization, contact the bundle publisher.
Copying a bundle 77
Upgrading a bundle
You can upgrade an installed bundle when an updated version becomes available. You can check the bundle
status on the Installed Bundles tab of the Add-On Bundles page.
Uninstalling a bundle
Uninstall a bundle if users in your organization no longer need it. Uninstall the bundle on the Installed Bundles
tab of the Add-On Bundles page.
Note: Uninstalling a bundle removes all of the bundle assets from the organization. If you want to keep tasks
that use assets in the bundle, remove the assets from the task before you uninstall the bundle.
Event monitoring
You can monitor events for the assets, licenses, users, and Secure Agents in your organization through the
asset and security logs. To view the logs, you must be assigned a role that has the Audit Log - View privilege.
Asset log
• Events for assets such as when an asset was created, updated, copied, or deleted and the name of
the user who modified the asset.
• Events related to licenses such as when a license was added, removed, or changed.
To open the asset log, in Administrator, select Logs, and then select Asset Logs at the top of the page.
Security log
• Authentication events for users such as when a user in the organization logged in to or out of
Informatica Intelligent Cloud Services.
• Events for Secure Agents and organizations such as when each agent was created or updated, when
organization information was updated, and the name of the user who modified the agent or
organization.
To open the security log, in Administrator, select Logs, and then select Security Logs at the top of the
page.
79
The following image shows the asset log:
Asset logs display events for the past 90 days. Security logs display events for the past 400 days.
You can customize the properties that are displayed in the logs in the following ways:
• To hide a column, right-click the column heading area and uncheck the column that you want to hide.
• To sort the log events, click the column heading for the property that you want to sort by. To reverse the
sort order, click the column heading again.
• To search the logs for specific events, enter the search string in the Find field. You can search for an
object name or event type.
Troubleshooting security
I received the following security violation error:
There may have been a security violation while accessing the site. Verify that there are
no malicious scripts running in your browser. This error also appears when you submit
the form multiple times through a browser reload.
This error appears when you click an option on a page while the page is still loading from a previous click.
Click the Here link to return to Data Integration.
When I try to view the details about an object, such as a connection or replication task, the Object
Not Found page displays.
The object was recently deleted. The Object Not Found page appears when an object no longer exists.
Refresh the page to display current objects.
81
Chapter 10
Licenses
Licenses determine the Informatica Intelligent Cloud Services subscription level for the organization and
provide access to Informatica Intelligent Cloud Services features, connectors, and bundles.
As an administrator, you can review the licenses that are set up for your organization, verify license expiration
dates, and manage sub-organization licenses.
You can also review metrics for licensed job limits and usage. For information about reviewing metrics, see
Chapter 3, “Metering” on page 28.
License categories
Licenses are categorized as edition licenses, connector licenses, and custom licenses.
Edition licenses
Edition licenses can be feature-based or usage-based. Feature-based edition licenses provide access to
Informatica Intelligent Cloud Services features such as Data Integration mapping tasks, business
services components, and fine-grained security. Usage-based edition licenses, such as the license for
the Intelligent Cloud Data Management feature, provide access to Informatica Intelligent Cloud Services
using a pre-paid consumption model.
Connector licenses
Connector licenses provide connectivity to entities such as Amazon Redshift, Microsoft SQL Server, and
Oracle.
Custom licenses
Custom licenses are licenses that are not part of an edition. They provide access to features, packages,
or bundles. If your organization uses a custom license that provides access to a feature that is also
included in an edition license, the terms of the custom license override the terms of the edition license.
License types
When you create an organization, Informatica Intelligent Cloud Services assigns the organization a license
type for each licensed edition.
82
Trial
You can use the edition free of charge for a 30-day period. At the end of the trial period, you can
subscribe to the edition. A trial subscription might provide limited access to the features, connectors,
and packages that are associated with the license.
Subscription
You can use the licensed edition for the duration of the contract period. Near the end of the contract
period, Informatica Intelligent Cloud Services indicates that the contract is about to expire. Renew the
contract to continue to use the edition.
Free subscription
You can use the synchronization task free of charge. A free subscription might provide limited access to
the features of the synchronization task.
Sub-organization licenses
A sub-organization has licenses that are maintained by the parent organization. If a sub-organization requires
a license that does not belong to the parent organization, contact Informatica Global Customer Support to
obtain the license for the parent organization.
When you create a sub-organization, each sub-organization inherits licenses from the parent organization as
custom licenses. The sub-organization inherits all licenses except for the following licenses:
When you manage licenses individually, administrators for the parent organization can disable, enable,
and shorten the expiration dates for the inherited licenses. They manage the licenses separately for each
sub-organization. Sub-organization administrators can view licenses but cannot change them.
If you have the appropriate license, you can automatically synchronize sub-organization licenses with the
parent organization. When this license is enabled, each time a license is changed in the parent
organization, all sub-organizations inherit the license change.
You might want to enable license synchronization when your organization has many sub-organizations
and the sub-organizations have the same licenses.
If license synchronization is not enabled for your organization, then you must manage sub-organization
licenses individually.
Note: If you link a sub-organization that has a license that the parent organization does not have, the sub-
organization loses the license.
Sub-organization licenses 83
Editing sub-organization licenses
You can edit sub-organization licenses if you are an administrator in the parent organization and if license
synchronization between the parent organization and sub-organizations is not enabled. You can edit sub-
organization licenses from within the parent organization or from within the sub-organization.
To enable license synchronization, contact Informatica Global Customer Support and request the license for
this feature. When the license is enabled for the parent organization, license synchronization with the sub-
organizations happens automatically. The parent organization administrator does not have to take any action
to synchronize the licenses.
Note: When the license for this feature is enabled, you cannot edit sub-organization licenses individually.
When the license for this feature is enabled and you disable a sub-organization, the sub-organization loses its
license settings. When you re-enable the sub-organization, the sub-organization inherits all license settings
from the parent organization.
License synchronization between a parent organization and sub-organizations does not affect the license
meter counts in the sub-organizations.
The organization type is editable when a parent organization administrator views the Licenses page for a
sub-organization. It is not editable by sub-organization users or in a parent organization.
License expiration
When a license expires, you cannot access the features, connectors, or packages that are associated with the
license. Scheduled jobs that are associated with the license are also disabled. If all licenses for the
organization expire, you cannot log in to Informatica Intelligent Cloud Services.
You can review the expiration date for licenses on the Licenses page in Administrator. To extend a license,
contact Informatica Global Customer Support. After you extend a license, you can access the associated
features, connectors, and packages, and the scheduled jobs resume processing.
License expiration 85
Index
B
Bitbucket user credentials 51
blackout period
F
configuring for the organization 72 fingerprint authentication
bundles organizations 16
copying 77
installing 76
managing 76
uninstalling 78
G
upgrading 78 GitHub user credentials 51
viewing 76 guidelines
logo and favicon 55
C I
CLAIRE
recommendation preferences 18 Informatica Global Customer Support
Cloud Application Integration community contact information 7
URL 6 Informatica Intelligent Cloud Services
Cloud Developer community web site 6
URL 6 IP address filtering
connections configuring 14
storing properties 15 IPU meters 28, 32
custom branding IPU usage
configuring for an organization 55, 56 billing periods 29
settings 45 disabled and deleted sub-organizations 34
customer managed keys monitoring 29
configuring 56 reports 35
settings 45
J
D job limits
Data Ingestion and Replication service monitoring 38
metering usage reports 43
86
job usage organizations (continued)
monitoring 38 Data Integration Service properties 17
deleting a sub-organization 23
disabling and enabling sub-organizations 24
L license expiration 85
linking an organization as a sub-organization 22
license meters 37 metering 28
license metrics overview 11
viewing 38 properties 12
licenses removing sub-organizations 22
configuring the sub-organization type 84 sandbox 25
editing sub-organization licenses 84 schedule offset 17
expiration 85 secrets manager configuration 45, 60
management 82 session idle timeout 14
sub-organizations 83 setting up 12
types 82 source control best practices 52
login denied source control configuration 46
troubleshooting 81 source control settings 45
storing connection properties 15
switching to another organization 24
M types 11
unlinking a sub-organization 23
maintenance outages 7
metering
IPU meters 28, 32
IPU scalars 31
P
IPU usage reports 35 passwords
meter definitions 39 expiration 14
organizations and sub-organizations 28 minimum character mix 14
serverless compute units 42 minimum length 14
usage reports 43 reuse 14
viewing all meters 38 permissions
viewing IPU metrics 29 best practices 68
viewing IPU usage 29 configuring for objects 69
viewing license metrics 38 for copied assets 67
viewing usage details 42 for imported assets 67
viewing usage graphs 42 overview 67
metering usage reports permission descriptions 67
downloading 44 rules and guidelines 68
information 43
monitoring
events 79
R
repeat frequency
O description 74
schedules 72
organization hierarchies
creating a sub-organization 21
unlinking a sub-organization 23
organizations
S
synchronizing sub-organization licenses 84 scalars
adding sub-organizations 21 IPU meters 31
additional production 25 schedules
authentication properties 14 associating with tasks or taskflows 71
changing source control repository 50 configuring 74
CLAIRE recommendation preferences 18 configuring a blackout period 72
configuring custom branding 56 Daylight Savings Time 73
creating a sub-organization 21 deleting 71
creating additional production organizations 26 description 71
creating sandbox organizations 26 exporting 75
custom branding configuration 55 importing 75
customer managed key settings 45 monitoring scheduled tasks 71
customer managed keys 56 repeat frequency 72
Index 87
schedules (continued) sub-organizations (continued)
schedule offset 17 configuring custom branding 56
Secure Agent service restart 55 creating 21
time zones 73 customer managed key settings 45
secret vaults See secrets managers Data Integration Service properties 17
secrets managers deleting an existing sub-organization 23
AWS Secrets Manager connection properties 62 denying parent organization access 24
Azure Key Vault connection properties 63 disabling and enabling 24
configuring for an organization 60 disabling and IPU usage 34
connection configuration 65 disabling source control 51
disabling for an organization 64 editing licenses 84
enabling for an organization 64 enabling source control 48
HashiCorp Vault connection properties 64 Enterprise Data Catalog integration properties 18
restrictions on secret names 61 example 19
Secure Agent exporting and importing assets 25
storing connection properties 15 general properties 13
Secure Agent services license expiration 85
restart schedule configuration 55 licenses 83
rolling upgrade error handling 54 linking an existing organization 22
rolling upgrades 53 metering 28
upgrade settings 45 organization type 84
security properties 12
troubleshooting 81 reasons to create 19
security logs removing 22
maximum log entries 17 schedule offset 17
viewing 79 secrets manager configuration 45
serverless runtime environments source control configuration 47
metering usage reports 43 source control settings 45
serverless compute units 42 storing connection properties 15
session idle timeout switching to another organization 24
configuring 14 unlinking from a parent organization 23
source control system status 7
best practices 52
changing the repository URL 50
configuring access to the repository 51
configuring access using OAuth 47
T
configuring for a sub-organization 47 time zones
configuring for an organization 46 description 73
configuring read-only access to the repository 46 troubleshooting
configuring read/write access to the repository 46 security 81
development guidelines 52 trust site
disabling for an organization 51 description 7
enabling for an organization 48 trusted IP ranges
on-premises repositories 48 configuring 14
settings 45
setup guidelines 52
undoing a check out 53
status
U
Informatica Intelligent Cloud Services 7 upgrade notifications 7
Streaming Ingestion and Replication usage-based licenses
metering usage reports 43 meters 32
sub-organizations IPU metrics 28
synchronizing licenses 84
add-on connectors 25
adding 21
authentication properties 14
W
changing source control repository 50 web site 6
CLAIRE recommendation preferences 18
88 Index