Configuring Repositories to Use Profiling Process with Pipes - trillium_discovery - trillium_quality - 17.1

Trillium DQ Repository Administrator Guide

Product type
Software
Portfolio
Verify
Product family
Trillium
Product
Trillium > Trillium Discovery
Trillium > Trillium Quality
Version
17.1
Language
English
Product name
Trillium Quality and Discovery
Title
Trillium DQ Repository Administrator Guide
Topic type
Overview
Administration
Configuration
Installation
Reference
How Do I
First publish date
2008

Before users can use pipes with profiling processes (including Analysis, Business Rules, Dependencies, Keys, and Load) in the Control Center, the repository administrator must configure the repository by adding administrator or generic username password account information to a user-created file called admin_conf.txt. In Windows-authenticated environments the SYSTEM security permission to each repository must also be set.

Without setting these two configurations, users in the Control Center will be unable to run Trillium Quality profiling processes using pipes.

Note the following guidelines:

  • Only one instance of the file admin_conf.txt can exist for each repository.

  • Username and password account information need only be configured one time per repository.

Complete the procedure for each repository where piping will be used for profiling processes.

To add account information

  1. On the system where your repository is installed, create a text file called admin_conf.txt in the repository directory.

    For example, C:\ProgramData\Trillium Software\MBSW\17\Data\metabase\repository_name.

  2. In the admin_conf.txt file, on separate lines, add one entry for the username and one entry for the password.

    Use the following syntax:

    ser=yourusername 

    password=yourpassword 

  3. Save and close the file.

Note: The SYSTEM permission does not have to be set in Trillium-authenticated environments.

To add SYSTEM security permission to support Windows authentication

  1. In the Repository Manager, on the Home tab, click Repository Security. The Permissions for Repository Security window opens.

  2. Click Add. The Select Users, Computers, Service Accounts, or Groups window opens.

  3. In the Enter object names to select field, enter system and click OK.

  4. In the Group or user names section, select SYSTEM.

  5. In the Permissions for SYSTEM section, select the Allow check box for each permission.

  6. Click OK.