CDI October2021 GettingStarted en
CDI October2021 GettingStarted en
October 2021
Getting Started
Informatica Cloud Data Integration Getting Started
October 2021
© Copyright Informatica LLC 2016, 2021
This software and documentation are provided only under a separate license agreement containing restrictions on use and disclosure. No part of this document may be
reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC.
U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial
computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such,
the use, duplication, disclosure, modification, and adaptation is subject to the restrictions and license terms set forth in the applicable Government contract, and, to the
extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License.
Informatica, Informatica Cloud, Informatica Intelligent Cloud Services, PowerCenter, PowerExchange, and the Informatica logo are trademarks or registered trademarks
of Informatica LLC in the United States and many jurisdictions throughout the world. A current list of Informatica trademarks is available on the web at https://
www.informatica.com/trademarks.html. Other company and product names may be trade names or trademarks of their respective owners.
Portions of this software and/or documentation are subject to copyright held by third parties. Required third party notices are included with the product.
The information in this documentation is subject to change without notice. If you find any problems in this documentation, report them to us at
infa_documentation@informatica.com.
Informatica products are warranted according to the terms and conditions of the agreements under which they are provided. INFORMATICA PROVIDES THE
INFORMATION IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT.
Table of Contents 3
Chapter 8: Switching to a different organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4 Table of Contents
Preface
Refer to Getting Started for information about how to begin using Informatica Cloud® Data Integration.
Getting Started explains how to configure a runtime environment, connect Data Integration to your system,
and begin a project.
Informatica Resources
Informatica provides you with a range of product resources through the Informatica Network and other online
portals. Use the resources to get the most from your Informatica products and solutions and to learn from
other Informatica users and subject matter experts.
Informatica Documentation
Use the Informatica Documentation Portal to explore an extensive library of documentation for current and
recent product releases. To explore the Documentation Portal, visit https://docs.informatica.com.
If you have questions, comments, or ideas about the product documentation, contact the Informatica
Documentation team at infa_documentation@informatica.com.
https://network.informatica.com/community/informatica-network/products/cloud-integration
Developers can learn more and share tips at the Cloud Developer community:
https://network.informatica.com/community/informatica-network/products/cloud-integration/cloud-
developers
5
https://marketplace.informatica.com/
To search the Knowledge Base, visit https://search.informatica.com. If you have questions, comments, or
ideas about the Knowledge Base, contact the Informatica Knowledge Base team at
KB_Feedback@informatica.com.
Subscribe to the Informatica Intelligent Cloud Services Trust Center to receive upgrade, maintenance, and
incident notifications. The Informatica Intelligent Cloud Services Status page displays the production status
of all the Informatica cloud products. All maintenance updates are posted to this page, and during an outage,
it will have the most current information. To ensure you are notified of updates and outages, you can
subscribe to receive updates for a single component or all Informatica Intelligent Cloud Services
components. Subscribing to all components is the best way to be certain you never miss an update.
For online support, click Submit Support Request in Informatica Intelligent Cloud Services. You can also use
Online Support to log a case. Online Support requires a login. You can request a login at
https://network.informatica.com/welcome.
The telephone numbers for Informatica Global Customer Support are available from the Informatica web site
at https://www.informatica.com/services-and-training/support-services/contact-us.html.
6 Preface
Chapter 1
When you want to access data in an SaaS environment, you can use the Informatica Cloud Hosted
Agent. The Hosted Agent runs within the Informatica Intelligent Cloud Services hosting facility, so there
is nothing to install.
The Hosted Agent can run synchronization, mapping, and replication tasks that use certain connectors.
To find out if the connector that you use supports the Hosted Agent, see the help for the relevant
connector.
To use the Hosted Agent, your organization must have the Cloud Runtime license.
When you need to access data on-premises or when you want to access SaaS data without using the
Hosted Agent, use a Secure Agent group. A Secure Agent group contains one or more Secure Agents.
The agents in a group run within your network or in a cloud computing services environment such as
Amazon Web Services or Microsoft Azure.
To create a Secure Agent group, download and install the Secure Agent. You can install one Secure
Agent on each physical or virtual machine. Each agent that you install is added to its own group by
default. Based on your license, you can add multiple agents to a group to balance workloads and
improve scalability.
7
Step 3. Optionally, set up Data Integration Elastic
Data Integration Elastic provides you with elastic clusters where the Serverless Spark engine processes the
data flow logic that you define in an elastic mapping.
Before you can use Data Integration Elastic, complete the following tasks:
To use Data Integration Elastic, your organization must have the appropriate licenses.
For more information, see Data Integration Elastic Administration in the Administrator help.
If you use Data Integration Elastic, you can view a list of the supported connections for your cloud platform in
the Administrator help.
After you set up folders, create your project assets. Assets include the following objects:
• Mappings
• Tasks
• Taskflows
• Components such as business services, mapplets, and hierarchical schemas
Before you can add your project, your organization administrator must configure a link between the
organization and source control repository, and you must specify your source control user credentials in
Informatica Intelligent Cloud Services.
System requirements
You can find information about system requirements in the Product Availability Matrix (PAM) for Informatica
Intelligent Cloud Services.
The PAM indicates the versions of browsers, operating systems, databases, and other types of data sources
and targets that a product release supports. You can access the PAM on Informatica Network at
https://network.informatica.com/community/informatica-network/product-availability-matrices/.
Note: Some company security policies restrict the ability of users to enable CORS in a web browser. Before
you update these settings, verify that your company or IT department allows you to change the CORS
settings.
9
3. On the Security tab, click Trusted sites, and then click Sites as shown in the following image:
4. In the Trusted Sites dialog box, add the Informatica Intelligent Cloud Services domain to the zone, and
click Add.
5. Click Close.
8. Click OK.
9. If prompted, confirm that you want to change the settings for the zone.
10. Click OK.
11. Restart Internet Explorer and re-open Informatica Intelligent Cloud Services.
By default, the Secure Agent starts when you start Windows. You can stop and restart the Secure Agent using
the Secure Agent Manager or Windows Services. If you install the Secure Agent on a different volume than
you use to run the installation program, you must start and stop the Secure Agent from Windows Services.
You can also use the Secure Agent Manager to check the Secure Agent status and configure proxy
information.
You can launch the Secure Agent Manager from the Start menu or desktop icon. When you close the Secure
Agent Manager, it minimizes to the Windows taskbar notification area for quick access.
When you install a Secure Agent, you perform the following tasks:
1. Verify that the machine where you install the Secure Agent meets the minimum requirements.
2. Download the Secure Agent installer files.
3. Install and register the Secure Agent.
Verify the following requirements before you install the Secure Agent on Windows:
• Verify that the machine on which you install the Secure Agent uses a supported operating system. For the
list of supported operating systems for the Secure Agent, see the Product Availability Matrix (PAM) for
Informatica Intelligent Cloud Services on the Product Availability Matrices page on Informatica Network.
• Verify that the machine where you install the Secure Agent has at least 5 GB of free disk space.
• Verify that the account you use to install the Secure Agent has access to all remote directories that
contain flat source or target files.
• Verify that no other Secure Agent is installed on the machine. If another Secure Agent is installed on the
machine, you must uninstall it first.
For more information about Secure Agent requirements, contact Informatica Global Customer Support.
14
Configure the firewall
If your organization uses a protective firewall, include the Informatica Intelligent Cloud Services domain
name or IP address ranges in the list of approved domain names or IP addresses. You should also enable the
port that the Secure Agent uses. This ensures that the Secure Agent can perform all necessary tasks through
the firewall.
The Secure Agent uses port 443 (HTTPS) to connect to the internet. Configure your firewall to allow traffic to
pass over port 443.
The whitelists of domains and IP addresses can vary according to your data center, which is also called a
POD (Point of Deployment). You can identify your POD through the URL that appears when you open any
service in Informatica Intelligent Cloud Services. The first few characters of the URL string identify the POD.
For example, if the URL starts with usw3.dm-us.informaticacloud.com, your POD is USW3.
You can find the whitelists of Informatica Intelligent Cloud Services domains and IP addresses for different
PODs in this Knowledge Base article on Informatica Network or by clicking the link at the top of the Runtime
Environments page in Administrator.
When you install a Secure Agent on Windows, the Secure Agent must be part of the local Administrators
group.
You can configure proxy settings in Secure Agent Manager. Configure a login for the Windows Secure Agent
service on Windows.
Note: If you use the Secure Agent for Informatica Cloud Data Wizard, you do not need to configure proxy
settings or a Windows service login for the Secure Agent.
Secure Agent registration requires an install token. To get the install token, copy the token when you
download the agent or use the Generate Install Token option in Administrator. The token expires after 24
hours.
Before you download and install the Secure Agent, verify that no other Secure Agent is installed on the
machine. If there is, you must uninstall it.
5. If you did not copy the install token when you downloaded the agent, click Generate Install Token on the
Runtime Environments page in Administrator, and copy the token.
6. In the Secure Agent Manager, enter the following information, and then click Register:
Option Description
User Name User name that you use to access Informatica Intelligent Cloud Services.
The Secure Agent Manager displays the status of the Secure Agent. It takes a minute for all of the
services to start.
7. If your organization uses an outgoing proxy server to connect to the internet, enter the proxy server
information.
8. Close the Secure Agent Manager.
The Secure Agent Manager minimizes to the taskbar and continues to run as a service until stopped.
Field Description
Proxy Host Required. Host name of the outgoing proxy server that the Secure Agent uses.
4. Click OK.
The Secure Agent Manager restarts the Secure Agent to apply the settings.
Configure a login for the machine on which the Secure Agent is installed to allow the Secure Agent to access
directories to configure and run tasks. When you configure connections, configure tasks, and run tasks that
use Flat File or FTP/SFTP connection types, the Secure Agent might require read and write permissions on
the related directories.
For example, to browse to a directory to configure a Flat File or FTP/SFTP connection, the Secure Agent login
might require permission to access the directory. Without a Secure Agent login with the appropriate
permissions, Informatica Intelligent Cloud Services cannot display the directory in the Browse for Directory
dialog box.
You can also use the shell command line to check the Secure Agent status.
When you install a Secure Agent, you perform the following tasks:
1. Verify that the machine where you install the Secure Agent meets the minimum requirements.
2. Download the Secure Agent installer files.
3. Install and register the Secure Agent.
Verify the following requirements before you install the Secure Agent on Linux:
• Verify that the machine on which you install the Secure Agent uses a supported operating system. For the
list of supported operating systems for the Secure Agent, see the Product Availability Matrix (PAM) for
Informatica Intelligent Cloud Services on the Product Availability Matrices page on Informatica Network.
• Verify that the machine where you install the Secure Agent has at least 5 GB of free disk space.
• The account that you use to install the Secure Agent must have access to all remote directories that
contain flat source or target files.
• If you use PowerCenter, install the Secure Agent using a different user account than the account you used
to install PowerCenter.
Informatica Intelligent Cloud Services and PowerCenter use some common environment variables. If the
environment variables are not set correctly for Informatica Intelligent Cloud Services, your jobs might fail
at run time.
For more information about Secure Agent requirements, contact Informatica Global Customer Support.
The Secure Agent uses port 443 (HTTPS) to connect to the internet. Configure your firewall to allow traffic to
pass over port 443.
The whitelists of domains and IP addresses can vary according to your data center, which is also called a
POD (Point of Deployment). You can identify your POD through the URL that appears when you open any
service in Informatica Intelligent Cloud Services. The first few characters of the URL string identify the POD.
For example, if the URL starts with usw3.dm-us.informaticacloud.com, your POD is USW3.
You can find the whitelists of Informatica Intelligent Cloud Services domains and IP addresses for different
PODs in this Knowledge Base article on Informatica Network or by clicking the link at the top of the Runtime
Environments page in Administrator.
When you install a Secure Agent on Linux, the Secure Agent must have read/write/execute permissions for
the installation directory.
Secure Agent registration requires an install token. To get the install token, copy the token when you
download the agent or use the Generate Install Token option in Administrator. The token expires after 24
hours.
Before you download and install the Secure Agent, verify that no other Secure Agent is installed on the
machine using the same Linux user account. If there is, you must uninstall it.
The Secure Agent installer configures the proxy server settings for the Secure Agent based on settings
configured in the browser. You can update the proxy server settings defined for the Secure Agent from the
command line.
To configure the proxy server settings for the Secure Agent on a Linux machine, use a shell command that
updates the proxy.ini file. Contact the network administrator to determine the proxy settings.
Connection configuration
When you create a connection, it's available to your Data Integration organization.
For most connection types, when you configure a connection, you specify the runtime environment for the
connection. The runtime environment must contain an agent that is running when you configure the
connection. For other connection types, you specify the runtime environment when you configure the task.
This section includes general information about setting up a connection. For more information about
connections and for specific information about configuring Flat File and FTP connections, see Connections.
For specific information about other connection types, see the Data Integration Connector topics in the
Connectors section of the help.
Configuring a connection
You can configure a connection on the Connections page, in a wizard as you configure a task or taskflow, or
in the Mapping Designer as you configure a mapping.
2. Configure the connection-specific properties. For example, if this is a Flat File connection type, enter the
runtime environment to be used with the connection, the directory where the flat file is stored, the date
21
format for date fields in the flat file, and the code page of the system that hosts the flat file. The
following image shows the property fields for a flat file connection:
3. To test the connection, click Test. The results of the test display on the page, as shown in the following
image:
When you search for an object, the Select Object dialog box displays the objects available for the connection.
You can select one of the objects or you can enter a search string. To begin a search, click Search or press
Enter.
For synchronization and mapping tasks, use object search when the connection responds slowly.
Databases Name
CDC Name
Project setup
Create projects and project folders on the Explore page to organize your assets. After you have set up the
runtime environment and connections that are required for a project, you can create the assets for the
project.
To create a project, go to the Explore page and select to explore by projects and folders, and then click New
Project.
To create a project folder, go to the Explore page and open the project, and then click New Folder.
You can create one level of folders in a project. You cannot create folders within folders.
For more information about working with projects, see Asset Management.
24
Creating assets
Create integration assets and assign them to projects.
To create a custom asset, click New and then select the asset type. For specific information on creating a
particular type of asset, see the appropriate asset type in Mappings or Tasks.
To create an asset from a template, click New, select the asset type, and then select the appropriate
template. Mapping task templates and mapping templates are listed below the heading that corresponds to
the mapping type.
The following image shows the dialog box that appears when you create an asset:
1. Select the type of asset that you want to create. In this image, Tasks is selected.
2. Select one of these options to create a custom asset. Since Tasks is selected on the left, this area lists the tasks
that you can create.
3. Select one of the options below a heading to create a task from a template. In this image, the Integration heading is
expanded, so the templates listed are based on data integration mappings.
Tip: Informatica recommends that you use a standard naming convention that makes sense for your
organization. Here are a few examples:
• You can begin all asset names with an abbreviation of the asset type. For example, mapping names begin
with m_ and mapping tasks begin with mt_.
• Within mappings, you can begin all Source transformation names with src_, all parameter names with p_,
and so on.
• You can use names that explain the purpose of the object, For example, filter names begin with flt_.
A standard naming convention is particularly helpful when you are working with large, complex mappings so
that you can easily identify the type and purpose of each object.
Creating assets 25
Chapter 6
Before your organization can use source control, the organization administrator must configure a link
between the Informatica Intelligent Cloud Services organization and a GitHub or Azure DevOps Git source
control repository.
If your organization has read/write access to the source control repository, you can add your projects and
assets to the repository. Each time you check out the objects, make changes, and then check them in to the
repository, the source control system creates a new version of the objects.
If your organization has read-only access to the source control repository, you can pull versions of projects
and assets to your organization, but you cannot add new or updated objects to the repository.
Your credentials can include a user name and a personal access token.
If your administrator has configured the organization's repository for OAuth access, you can enable OAuth
access instead of providing a personal access token.
Personal access tokens must be configured to enable full control of private repositories. For information
about generating a personal access token, see the GitHub or Azure DevOps Git help.
In Informatica Intelligent Cloud Services, perform the following steps to configure access to the repository:
1. Click the User icon in the top right corner of the Informatica Intelligent Cloud Services window and then
select Settings.
2. Perform one of the following tasks:
• Enter your repository credentials. For GitHub, enter your user name and personal access token. For
Azure DevOps Git, enter your personal access token.
• Enable OAuth access to the repository. If you have not already authorized access, a Git access app
appears. Select to authorize access for Informatica Intelligent Cloud Services.
3. Click Save.
26
Chapter 7
Note: If you use SAML to sign on to Informatica Intelligent Cloud Services and your organization
administrator has enabled SAML group and role mapping on the SAML Setup page in Administrator, you can
only update the time zone. The other attributes are updated directly from your enterprise directory each time
you log into Informatica Intelligent Cloud Services.
1. Click the User icon in the top right corner of the Informatica Intelligent Cloud Services window and then
select Profile.
2. On the Profile page, add or edit personal information such as your name, job title, phone number, email
address, and time zone.
3. Optionally, change your password or security question.
4. Click Save.
27
Chapter 8
Switching to a different
organization
If you are an administrator in a parent organization or a user in a parent organization that has privileges to
view sub-organizations, you can switch among organizations. You do not have to log out and log back in to
Informatica Intelligent Cloud Services.
Note: If you switch from a parent organization to a sub-organization, you can't perform the following
operations in the sub-organization:
u From the Organization menu in the upper right corner, select the organization that you want to view.
28
Index
A H
assets Hosted Agent
creating 25 definition 7
source control 26
Azure DevOps user credentials 26
I
C Informatica Global Customer Support
contact information 6
Cloud Application Integration community Informatica Intelligent Cloud Services
URL 5 web site 5
Cloud Developer community Internet Explorer 11
URL 5 requirements 9
connections
configuring properties 21
creating 21
testing 21
L
creating Linux
assets 25 configuring proxy settings 20
folders 24 lookups
projects 24 searching in a task wizard 22
D M
Data Integration community maintenance outages 6
URL 5
directories
configuring Secure Agent login to access 17
O
object search
E in a task wizard 22
organizations
email addresses switching to another organization 28
for notification 27
P
F passwords
firewall changing 27
configuration 15, 18 POD
folders how to identify 15, 18
creating 24 Product Availability Matrix 9
profiles
editing 27
G projects
creating 24
getting started creating folders 24
activities 7 source control 26
GitHub user credentials 26 proxy settings
configuring on Linux 20
configuring on Windows 17
29
R sub-organizations
switching to another organization 28
requirements system requirements 9
Internet Explorer 11 9 system status 6
Product Availability Matrix 9
Secure Agent 14, 18
runtime environments
configuring 7
T
targets
searching in a task wizard 22
S time zones
changing user profile 27
search trust site
for objects for a task wizard 22 description 6
Secure Agent groups
definition 7
Secure Agent Manager
launching 14
U
Secure Agents upgrade notifications 6
communication port 15, 18 user profiles
configuring a Windows service login 17 editing 27
definition 7
domains whitelist 15, 18
installing on Linux 19
installing on Windows 15
V
IP address whitelist 15, 18 version control 26
permissions on Linux 19
permissions on Windows 15
registering on Linux 19
registering on Windows 15
W
requirements on Linux 18 web site 5
requirements on Windows 14 whitelist
starting on Windows 14 Secure Agent domains 15, 18
security questions Secure Agent IP addresses 15, 18
editing 27 Windows
source control configuring proxy settings 17
configuring access to the repository 26 Windows service
sources configuring Secure Agent login 17
searching in a task wizard 22
status
Informatica Intelligent Cloud Services 6
30 Index