Configuring Repositories to Use Profiling Processes with Pipes Quality - trillium_discovery - trillium_quality - Latest

Inline Quality and Discovery

Product type
Software
Portfolio
Verify
Product family
Trillium
Product
Trillium > Trillium Quality
Trillium > Trillium Discovery
Version
Latest
Language
English
Product name
Trillium Quality and Discovery
Title
Inline Quality and Discovery
Copyright
2024
First publish date
2008
Last updated
2024-10-18
Published on
2024-10-18T15:10:12.949492

Before users can use pipes with profiling processes (including Analysis, Business Rules, Dependencies, Keys, and Load) in the Control Center, the repository or system administrator must configure the repository by adding administrator or generic username password account information to a user-created file called admin_conf.txt. In Windows-authenticated environments the SYSTEM security permission to each repository must also be set.

Without setting these two configurations, users in the Control Center will be unable to run Quality profiling processes using pipes.

Note the following guidelines:

  • Only one instance of the file admin_conf.txt can exist for each repository.
  • Username and password account information need only be configured one time per repository.

To add account information

Complete this procedure for each repository where piping will be used for profiling processes.

  1. On the system where your repository is installed, create a text file called admin_conf.txt in the repository directory.
  2. In the admin_conf.txt file, on separate lines, add one entry for the username and one entry for the password.

    Use the following syntax: user=yourusername password=yourpassword

  3. Save and close the file.

To add SYSTEM security permission to support Windows authentication

Note:

The SYSTEM permission does not have to be set in Trillium-authenticated environments.

  1. In the Repository Manager, on the Home tab, click Repository Security. The Permissions for Repository Security window opens.
  2. Click Add. The Select Users, Computers, Service Accounts, or Groups window opens.
  3. In the Enter object names to select field, enter system and click OK.
  4. In the Group or user names section, select SYSTEM.
  5. In the Permissions for SYSTEM section, select the Allow check box for each permission.
  6. Click OK.