Skip to main content

External utilities

Several endpoints support running user-defined commands for pre/post-processing files. In this tab, you can provide user credentials for user-defined commands that needs to be executed at operating system level.

By default, such commands are executed under the Replicate Server service account. This may constitute a security risk, as it allows any Replicate user with Admin or Designer permissions to specify user-defined commands that could lead to a full compromise of the server.

Note that when Replicate Server is installed on Linux, this tab will be hidden as the potential security risk is relevant to Windows only.

Information note

Changes to settings will only take affect after restarting all tasks.

Endpoints that support user-defined commands are as follows:

  • Amazon S3 target
  • File source
  • File target
  • Google Cloud Storage target
  • Microsoft Azure ADLS target
Information note

IMPORTANT  Execution of user-defined commands is blocked by default. To allow execution of user-defined commands, follow the procedure described in Controlling execution of user-defined commands.

  • Select Replicate service account.

  1. Select Another account and then specify a user name and password in the designated fields.

    For domain users, the user name should be entered in the following format: Domain/Username

    For local users, the Domain is not required.

  2. If you changed the default Attunity Replicate Server service Log On user, add the user specified in the Attunity Replicate Server service Log On tab to the "Replace a process level token" policy in the "Local Security Policy" settings.

Did this page help you?

If you find any issues with this page or its content – a typo, a missing step, or a technical error – let us know how we can improve!