Several endpoints support running user-defined commands for pre/post-processing files. In this tab, you can provide user credentials for user-defined commands that needs to be executed at operating system level.
By default, such commands are executed under the Replicate Server service account. This may constitute a security risk, as it allows any Replicate user with Admin or Designer permissions to specify user-defined commands that could lead to a full compromise of the server.
Note that when Replicate Server is installed on Linux, this tab will be hidden as the potential security risk is relevant to Windows only.
Changes to settings will only take affect after restarting all tasks.
Endpoints that support user-defined commands are as follows:
- Amazon S3 target
- File source
- File target
- Google Cloud Storage target
- Microsoft Azure ADLS target
IMPORTANT Execution of user-defined commands is blocked by default. To allow execution of user-defined commands, follow the procedure described in Controlling execution of user-defined commands.
To run user-defined commands under the Replicate service (Log On) account (the default):
Select Replicate service account.
To run user-defined commands under a different account:
Select Another account and then specify a user name and password in the designated fields.
For domain users, the user name should be entered in the following format: Domain/Username
For local users, the Domain is not required.
- If you changed the default Attunity Replicate Server service Log On user, add the user specified in the Attunity Replicate Server service Log On tab to the "Replace a process level token" policy in the "Local Security Policy" settings.