-
Success
Manage your Success Plans and Engagements, gain key insights into your implementation journey, and collaborate with your CSMsSuccessAccelerate your Purchase to Value engaging with Informatica Architects for Customer SuccessAll your Engagements at one place
-
Communities
A collaborative platform to connect and grow with like-minded Informaticans across the globeCommunitiesConnect and collaborate with Informatica experts and championsHave a question? Start a Discussion and get immediate answers you are looking forCustomer-organized groups that meet online and in-person. Join today to network, share ideas, and get tips on how to get the most out of Informatica
-
Knowledge Center
Troubleshooting documents, product guides, how to videos, best practices, and moreKnowledge CenterOne-stop self-service portal for solutions, FAQs, Whitepapers, How Tos, Videos, and moreVideo channel for step-by-step instructions to use our products, best practices, troubleshooting tips, and much moreInformation library of the latest product documentsBest practices and use cases from the Implementation team
-
Learn
Rich resources to help you leverage full capabilities of our productsLearnRole-based training programs for the best ROIGet certified on Informatica products. Free, Foundation, or ProfessionalFree and unlimited modules based on your expertise level and journeySelf-guided, intuitive experience platform for outcome-focused product capabilities and use cases
-
Resources
Library of content to help you leverage the best of Informatica productsResourcesMost popular webinars on product architecture, best practices, and moreProduct Availability Matrix statements of Informatica productsMonthly support newsletterInformatica Support Guide and Statements, Quick Start Guides, and Cloud Product Description ScheduleEnd of Life statements of Informatica products
Learn the basic requirements and best practices to install the secure agent.
Learn to install the secure agent on Windows/Linux/Cloud ecosystems, and RTE configuration.
SCIM (System for Cross-domain Identity Management) with IDMC can be set in the following methods:
- SCIM with Azure: provides seamless integration for automatic user provisioning and identity synchronization across multiple platforms, enhancing organizational access management and security.
- SCIM with Okta: allows for streamlined identity lifecycle management through automated user provisioning and de-provisioning, minimizing administrative overhead and improving operational efficiency by connecting Okta with various external applications and services.
A Role is a collection of privileges you can assign to users and groups. Assign at least one role to each user or user group to ensure that every user can access assets and perform tasks in your organization.
Learn how to add and test a connection.
Using a Secrets Manager allows organizations to maintain complete control over sensitive credentials like passwords and API tokens, managing them centrally for multiple environments. Configuring a secret vault for an organization in IDMC enables Secure Agents to dynamically access necessary credentials, enhancing security and operational efficiency without disrupting existing connections or tasks.
IPU consumption best practices emphasize efficient design and optimization of data workflows to minimize computational resources and costs. Regular monitoring, scalability considerations, and strategic use of features are critical in managing and reducing the consumption of Informatica Processing Units effectively.
Single Data Integration for all Integration patterns, users, deployment patterns, and architectures.