What's New > Upgrade > Post-upgrade tasks for the April 2025 release
  

Post-upgrade tasks for the April 2025 release

Perform the following tasks after your organization is upgraded to the April 2025 release.

Reindex records to view filter values

To get additional filter values, such as Blank, Not Blank, and Is in business applications, ensure that you reindex the records of business entities.
To reindex records of business entities, run a batch job to generate search indexes.
For more information about generating search indexes, see Define and run the generate search indexes or match keys job.

Import the process for the reprocess master data job

You need the predefined Cloud Application Integration process, MDMProcessMasterData, to recalculate the trust scores of the active and deleted master records.
To reprocess master data, ensure that you perform the following tasks after the organization is upgraded:
  1. 1Step 1. Modify permissions for the existing process.
  2. 2Step 2. Import the process to reprocess master data.
  3. 3Step 3. Get the artifact ID of the process.
  4. 4Step 4. Modify permissions and create a user for reprocessing master data.
  5. 5Step 5. Publish the process for reprocessing master data.

Step 1. Modify permissions for the existing process

If you don't have the MDMProcessMasterData process in your organization, you can start by importing the process to reprocess master data. For more information about importing the process to reprocess master data, see Step 2. Import the process to reprocess master data.
If you have the MDMProcessMasterData process from the July 2024 release, you need to get the latest process file that supports processing active and deleted records. Before you get the latest file, remove the read-only access to the process so that you can overwrite the existing file with the latest file.
To set the update permissions, use the UpdateACL API and submit a POST request.
To submit a POST request, use the following URI with the session ID of the administrator who manages the organization:
<baseApiUrl>/frs/v1/UpdateACL
When you submit a POST request to set the update permissions, you require the artifactId of the process. To get the artifactId of the process, see Step 3. Get the artifact ID of the process.

Sample Request

Use the following POST request to set the update permissions of the MDMProcessMasterData process:
POST https://use4.dm-us.informaticacloud.com/frs/v1/UpdateACL
IDS-SESSION-ID: XXXXXXXXXXXXXXXXXXXXXX
Content-Type: application/json
{
"artifactId": "<Artifact ID from Step 3>",
"aces": [
{
"operation": "CREATE_ACE",
"permission": {
"changePermission": true,
"read": true,
"update": true,
"delete": true,
"execute": true
},
"idsInfo": {
"id": "3VMH0uFUXQVddwVkjrfJUv",
"type": "USER"
}
}
]
}
Note: The service user ID, 3VMH0uFUXQVddwVkjrfJUv, remains a constant value for all the predefined Application Integration processes and doesn't vary between organizations.

Sample Response

After the POST request to modify the permissions of the MDMProcessMasterData process, you get the following response:

{
"@odata.context": "$metadata#BaseEntities",
"value": [
{
"guid": "FRS_ID",
"code": "FRS_200",
"message": "Successfully Updated ACLs"
}
]
}

Step 2. Import the process to reprocess master data

To reprocess master data, import the MDMProcessMasterData process after you upgrade the organization.
    1To request the MDMProcessMasterData process, contact Informatica Global Customer Support.
    After the necessary approvals, you'll receive a ZIP file that contains the MDMProcessMasterData process.
    2In Cloud Application Integration, click Explore.
    3Navigate to the Business360 folder.
    4Click Import.
    5On the Import Assets page, click Choose File, and select the ZIP file that contains the MDMProcessMasterData process, and click Open.
    6Click Import.

Step 3. Get the artifact ID of the process

To modify permissions and create a user to access the MDMProcessMasterData process, you require the artifact ID of the process to uniquely identify it.
To get the artifact ID of the process, use the LookupArtifactsDetailsByPath API and submit a POST request with the following URI:
POST <baseApiURL>/frs/api/v1/LookupArtifactsDetailsByPath

Sample Request

Use the following POST request to get the artifact ID of the MDMProcessMasterData process:
POST https://use4.dm-us.informaticacloud.com/frs/api/v1/LookupArtifactsDetailsByPath
IDS-SESSION-ID: XXXXXXXXXXXXXXXXXXXXXX
Content-Type: application/json
{
"lookupParamPath": [
{
"name": "MDMProcessMasterData",
"type": "PROCESS",
"location": [
{
"type": "Space",
"name": "REG"
},
{
"name": "Business360",
"type": "Project"
}
]
}
]
}

Sample Response

The sample response shows the HTTP 200 OK response code and gets the artifact ID of the MDMProcessMasterData process. The response shows the artifact ID as 9TvdYgWHVOrhUHnMLMCc0z in the artifact section.
{
"@odata.context": "$metadata#BaseEntities",
"value": [
{
"orgId": "4MEN7vwklj8biicae7QiKX",
"status": {
"code": "FRS_200",
"message": ""
},
"tags": [],
"artifact": {
"@odata.type": "#OData.frs.Document",
"id": "9TvdYgWHVOrhUHnMLMCc0z",
"name": "MDMProcessMasterData",
"description": "",
"owner": "2UQOrM7xtu1euGYkYlBeOr",
"createdBy": "2UQOrM7xtu1euGYkYlBeOr",
"lastUpdatedBy": "2UQOrM7xtu1euGYkYlBeOr",
"lastAccessedBy": "2UQOrM7xtu1euGYkYlBeOr",
"createdTime": "2024-07-25T04:01:13Z",
"lastUpdatedTime": "2024-08-01T11:29:30Z",
"lastAccessedTime": "2024-08-01T11:29:30Z",
"expiresBy": "2038-01-18T00:00:00Z",
"parentInfo": [
{
"parentId": "7cCn5thwWFLhiZoSosphKL",
"parentName": "REG",
"parentType": "Space"
},
{
"parentId": "0XuRGcy4SdyehONacV75yq",
"parentName": "Business360",
"parentType": "Project"
}
],
"documentType": "PROCESS",
"contentType": "application/json; charset=utf-8",
"documentState": "VALID",
"aclRule": "org",
"subcontainerCount": 0,
"customAttributes": {
"stringAttrs": [
{
"name": "publishedBy",
"value": "Delta_Apr4Adm"
},
{
"name": "SubType",
"value": ""
},
{
"name": "binding",
"value": "rest"
},
{
"name": "ReferencedPublishingAllowed",
"value": "true"
},
{
"name": "APIName",
"value": "MDMProcessMasterData"
},
{
"name": "publicationStatus",
"value": "published"
}
],
"numberAttrs": [],
"dateAttrs": [
{
"name": "publicationDate",
"value": "2024-08-01T11:29:39Z"
}
]
},
"repoInfo": {
"repoParams": [],
"repoPath": null,
"repoHandle": "tf2VR4109cjIw8j-gt-3576941-2024-07-25T04:01:13.177Z::pd.xml",
"frsPath": null
},
"isSourceControlled": false,
"checkedOutById": null
},
"docRef": null
}
]
}

Step 4. Modify permissions and create a user for reprocessing master data

After you import the MDMProcessMasterData process, set the process to read only so that users can't modify it. Additionally, the MDMProcessMasterData process includes a service user created and assigned to it by default.
You can remove the service user or modify its permission, but you can't create a new service user. When you upgrade your organizations to the latest release and the MDMProcessMasterData process has updates in the latest release, the service user requires the necessary permissions to upgrade the process. If you don’t assign the necessary permissions to the service user, the upgrade might fail.
To set the read-only permission for the process and to assign necessary permissions to the service user, use the UpdateACL API and submit a POST request. To submit a POST request, use the following URI with the session ID of the administrator who manages the organization:
<baseApiUrl>/frs/v1/UpdateACL

Sample Request

Use the following POST request to modify the permissions of the MDMProcessMasterData process to read only:
POST https://use4.dm-us.informaticacloud.com/frs/v1/UpdateACL
IDS-SESSION-ID: XXXXXXXXXXXXXXXXXXXXXX
Content-Type: application/json
{
"artifactId": "<Artifact ID from Step 3>",
"aces": [
{
"operation": "CREATE_ACE",
"permission": {
"changePermission": true,
"read": true,
"update": false,
"delete": false,
"execute": true
},
"idsInfo": {
"id": "<Organization ID>",
"type": "ORG"
}
}
]
}

Note: The Organization ID specifies the identifier of the organization to which the MDMProcessMasterData process was imported.
Use the following POST request to assign the necessary permissions for the service user assigned to the MDMProcessMasterData process:
POST https://use4.dm-us.informaticacloud.com/frs/v1/UpdateACL
IDS-SESSION-ID: XXXXXXXXXXXXXXXXXXXXXX
Content-Type: application/json
{
"artifactId": "<Artifact ID from Step 3>",
"aces": [
{
"operation": "CREATE_ACE",
"permission": {
"changePermission": true,
"read": true,
"update": true,
"delete": true,
"execute": true
},
"idsInfo": {
"id": "3VMH0uFUXQVddwVkjrfJUv",
"type": "USER"
}
}
]
}

Sample Response

After the POST requests to modify the permissions of the MDMProcessMasterData process and create a user to access the MDMProcessMasterData process are successful, you get the following response:
{
"@odata.context": "$metadata#BaseEntities",
"value": [
{
"guid": "FRS_ID",
"code": "FRS_200",
"message": "Successfully Updated ACLs"
}
]
}

Step 5. Publish the process for reprocessing master data

After you modify permissions and create a user for the MDMProcessMasterData process, publish the process to invoke or run it.
    1In Cloud Application Integration, click Explore.
    2Navigate to the Business360 folder.
    3Select the MDMProcessMasterData process, and click Actions.
    4Click Publish.

Import the process for matching external data

To match external data with master or source records without storing the external data, the match process requires match keys for master or source records. You can generate match keys for master records by using a generate search indexes or match keys job. The match keys for source records are generated during the ingress process.
Additionally, you need the predefined Cloud Application Integration process, MDMExternalMatch, to match external data with master or source records.
If you import the MDMExternalMatch process for the first time in your organization, perform the following steps:
  1. 1Step 1. Generate match keys for master records
  2. 2Step 2. Import the process for matching external data
  3. 3Step 3. Get the artifact ID of the process
  4. 4Step 4. Modify permissions for matching external data orchestration
  5. 5Step 5. Publish the process
Note: If the MDMExternalMatch process is already imported in your organization during the previous releases, you must reimport the latest version of the MDMExternalMatch process. For more information about reimporting the process, see Reimport the process for matching external data.

Step 1. Generate match keys for master records

To match external data with master records, generate match keys for master records by running a generate search indexes or match keys job. The match process uses match keys of master records for matching.
For more information about the generate search indexes or match keys job, see Define and run the generate search indexes or match keys job.

Step 2. Import the process for matching external data

MDM SaaS uses the predefined MDMExternalMatch process to orchestrate the process for matching external data.
    1To request the MDMExternalMatch process, contact Informatica Global Customer Support.
    After the necessary approvals, you'll receive a ZIP file that contains the MDMExternalMatch process.
    2In Cloud Application Integration, click Explore.
    3Navigate to the Business360 folder.
    4Click Import.
    5On the Import Assets page, click Choose File, and select the ZIP file that contains the MDMExternalMatch process, and click Open.
    6Click Import.

Step 3. Get the artifact ID of the process

To modify permissions of the MDMExternalMatch process, you require the artifact ID of the process to uniquely identify it.
To get the artifact ID of the process, use the LookupArtifactsDetailsByPath API and submit a POST request with the following URI:
POST <baseApiURL>/frs/api/v1/LookupArtifactsDetailsByPath

Sample Requests

Use the following POST request to get the artifact ID of the MDMExternalMatch process:
POST https://use4.dm-us.informaticacloud.com/frs/api/v1/LookupArtifactsDetailsByPath
IDS-SESSION-ID: XXXXXXXXXXXXXXXXXXXXXX
Content-Type: application/json
{
"lookupParamPath": [
{
"name": "MDMExternalMatch",
"type": "PROCESS",
"location": [
{
"type": "Space",
"name": "REG"
},
{
"name": "Business360",
"type": "Project"
}
]
}
]
}

Sample Response

The sample response shows the HTTP 200 OK response code and contains the artifact ID of the MDMExternalMatch process. The response shows the artifact ID as a7d1raphIOLdjfNVarUJaC in the artifact section.
{
"@odata.context": "$metadata#BaseEntities",
"value": [
{
"orgId": "lkV1tSYJzKYcdNHddSjsWN",
"status": {
"code": "FRS_200",
"message": ""
},
"tags": [],
"artifact": {
"@odata.type": "#OData.frs.Document",
"id": "a7d1raphIOLdjfNVarUJaC",
"name": "MDMExternalMatch",
"description": "",
"owner": "dR1G6Qi59OKj6qCYOfWZsA",
"createdBy": "dR1G6Qi59OKj6qCYOfWZsA",
"lastUpdatedBy": "dR1G6Qi59OKj6qCYOfWZsA",
"lastAccessedBy": "dR1G6Qi59OKj6qCYOfWZsA",
"createdTime": "2024-06-11T09:22:29Z",
"lastUpdatedTime": "2024-06-11T09:22:29Z",
"lastAccessedTime": "2024-06-11T09:22:29Z",
"expiresBy": "2038-01-18T00:00:00Z",
"parentInfo": [
{
"parentId": "7cCn5thwWFLhiZoSosphKL",
"parentName": "REG",
"parentType": "Space"
},
{
"parentId": "9Lf4MSeHu5vkk8CS6pTcA2",
"parentName": "Business360",
"parentType": "Project"
}
],
"documentType": "PROCESS",
"contentType": "application/json; charset=utf-8",
"documentState": "VALID",
"aclRule": "org",
"subcontainerCount": 0,
"customAttributes": {
"stringAttrs": [],
"numberAttrs": [],
"dateAttrs": []
},
"repoInfo": {
"repoParams": [],
"repoPath": null,
"repoHandle": "f2B7O2htghGZ5i4-gt-483987-2024-06-11T09:22:29.093Z::pd.xml",
"frsPath": null
},
"isSourceControlled": false,
"checkedOutById": null
},
"docRef": null
}
]
}

Step 4. Modify permissions for matching external data orchestration

After you import the MDMExternalMatch process, set the process to read only so that users can't modify it. Additionally, the MDMExternalMatch process is assigned to a service user by default.
You can remove the service user or modify its permission, but you can't create a new service user. When you upgrade your organizations to the latest release and the MDMExternalMatch process has updates in the latest release, the service user requires the necessary permissions to upgrade the process. If you don’t assign the necessary permissions to the service user, the upgrade might fail.
To set the read-only permission for the process and to assign necessary permissions to the service user, use the UpdateACL API and submit a POST request. To submit a POST request, use the following URI with the session ID of the administrator who manages the organization:
<baseApiUrl>/frs/v1/UpdateACL

Sample Requests

Use the following POST request to modify the permissions of the MDMExternalMatch process to read only:
POST https://use4.dm-us.informaticacloud.com/frs/v1/UpdateACL
IDS-SESSION-ID: XXXXXXXXXXXXXXXXXXXXXX
Content-Type: application/json
{
"artifactId": "<Artifact ID from Step 3>",
"aces": [
{
"operation": "CREATE_ACE",
"permission": {
"changePermission": true,
"read": true,
"update": false,
"delete": false,
"execute": true
},
"idsInfo": {
"id": "<Organization ID>",
"type": "ORG"
}
}
]
}
Note: The Organization ID specifies the identifier of the organization to which the MDMExternalMatch process was imported.
Use the following POST request to assign the necessary permissions for the service user assigned to the MDMExternalMatch process:
POST https://use4.dm-us.informaticacloud.com/frs/v1/UpdateACL
IDS-SESSION-ID: XXXXXXXXXXXXXXXXXXXXXX
Content-Type: application/json
{
"artifactId": "<Artifact ID from Step 3>",
"aces": [
{
"operation": "CREATE_ACE",
"permission": {
"changePermission": true,
"read": true,
"update": true,
"delete": true,
"execute": true
},
"idsInfo": {
"id": "3VMH0uFUXQVddwVkjrfJUv",
"type": "USER"
}
}
]
}
Note: The service user ID, 3VMH0uFUXQVddwVkjrfJUv, remains a constant value for all the predefined Application Integration processes and doesn't vary between organizations.

Sample Response

After the POST requests to modify the permissions of the MDMExternalMatch process and the service user assigned to it are successful, you get the following response:
{
"@odata.context": "$metadata#BaseEntities",
"value": [
{
"guid": "FRS_ID",
"code": "FRS_200",
"message": "Successfully Updated ACLs"
}
]
}

Step 5. Publish the process

After you modify permissions for the MDMExternalMatch process, publish the process to invoke or run it.
    1In Cloud Application Integration, click Explore.
    2Navigate to the Business360 folder.
    3Select the MDMExternalMatch process, and click Actions.
    4Click Publish.

Reimport the process for matching external data

If you already have the MDMExternalMatch process in your organization, you must reimport the latest version of the MDMExternalMatch process to match external data with master or source records.
To reimport the latest version of the MDMExternalMatch process, perform the following steps:
  1. 1Step 1. Get the artifact ID of the existing process
  2. 2Step 2. Assign write permissions to the user
  3. 3Step 3. Import the latest process for matching external data
  4. 4Step 4. Delete the write permission assigned to users
  5. 5Step 5. Publish the process
Note: If you import the MDMExternalMatch process for the first time in your organization, see Import the process for matching external data.

Step 1. Get the artifact ID of the existing process

To overwrite the existing MDMExternalMatch process, you need the artifact ID of the process to uniquely identify it. To get the artifact ID, log in to MDM SaaS.
To log in to MDM SaaS, use the Login API and submit a POST request with the following URI:
POST <baseApiURL>/saas/public/core/v3/login
To get the artifact ID of the process, use the LookupArtifactsDetailsByPath API and submit a POST request with the following URI:
POST <baseApiURL>/frs/api/v1/LookupArtifactsDetailsByPath

Sample Requests

Use the following POST request to log in to MDM SaaS:
POST https://use4.dm-us.informaticacloud.com/saas/public/core/v3/login
Content-Type: application/json
{
"username": "<username>",
"password": "<password>"
}
Use the following POST request to get the artifact ID of the existing MDMExternalMatch process:
POST https://use4.dm-us.informaticacloud.com/frs/api/v1/LookupArtifactsDetailsByPath
IDS-SESSION-ID: XXXXXXXXXXXXXXXXXXXXXX
Content-Type: application/json
{
"lookupParamPath": [
{
"name": "MDMExternalMatch",
"type": "PROCESS",
"location": [
{
"type": "Space",
"name": "REG"
},
{
"name": "Business360",
"type": "Project"
}
]
}
]

Sample Responses

After the POST request to log in to MDM SaaS is successful, you get the following response:
{
"products": [
{
"name": "Integration Cloud",
"baseApiUrl": "https://qa-pod1.rel.infaqa.com/saas"
}
],
"userInfo": {
"sessionId": "<Session ID>",
"id": "<User ID>",
"name": "<username>",
"parentOrgId": "52ZSTB0IDK6dXxaEQLUaQu",
"orgId": "<Org ID>",
"orgName": "<Org name>",
"groups": {},
"status": "Active"
}
}
After the POST request to get the artifact ID of the process is successful, you get the following response that shows the artifact ID as a7d1raphIOLdjfNVarUJaC.
{
"@odata.context": "$metadata#BaseEntities",
"value": [
{
"orgId": "lkV1tSYJzKYcdNHddSjsWN",
"status": {
"code": "FRS_200",
"message": ""
},
"tags": [],
"artifact": {
"@odata.type": "#OData.frs.Document",
"id": "a7d1raphIOLdjfNVarUJaC",
"name": "MDMExternalMatch",
"description": "",
"owner": "dR1G6Qi59OKj6qCYOfWZsA",
"createdBy": "dR1G6Qi59OKj6qCYOfWZsA",
"lastUpdatedBy": "dR1G6Qi59OKj6qCYOfWZsA",
"lastAccessedBy": "dR1G6Qi59OKj6qCYOfWZsA",
"createdTime": "2024-06-11T09:22:29Z",
"lastUpdatedTime": "2024-06-11T09:22:29Z",
"lastAccessedTime": "2024-06-11T09:22:29Z",
"expiresBy": "2038-01-18T00:00:00Z",
"parentInfo": [
{
"parentId": "7cCn5thwWFLhiZoSosphKL",
"parentName": "REG",
"parentType": "Space"
},
{
"parentId": "9Lf4MSeHu5vkk8CS6pTcA2",
"parentName": "Business360",
"parentType": "Project"
}
],
"documentType": "PROCESS",
"contentType": "application/json; charset=utf-8",
"documentState": "VALID",
"aclRule": "org",
"subcontainerCount": 0,
"customAttributes": {
"stringAttrs": [],
"numberAttrs": [],
"dateAttrs": []
},
"repoInfo": {
"repoParams": [],
"repoPath": null,
"repoHandle": "f2B7O2htghGZ5i4-gt-483987-2024-06-11T09:22:29.093Z::pd.xml",
"frsPath": null
},
"isSourceControlled": false,
"checkedOutById": null
},
"docRef": null
}
]
}

Step 2. Assign write permissions to the user

To overwrite the existing MDMExternalMatch process, assign write permission to the user who logged in to MDM SaaS.
To assign write permission to the user, use the UpdateACL API and submit a POST request with the following URI:
POST <baseApiURL>/frs/api/v1/UpdateACL

Sample Request

Use the following POST request to assign write permission to the user who logged in to MDM SaaS:
{
"aces": [
{
"operation": "CREATE_ACE",
"permission": {
"changePermission": true,
"read": true,
"update": true,
"delete": false,
"execute": true
},
"idsInfo": {
"id": "<User ID from Step 1>",
"type": "USER"
}
}
],
"artifactId": "<Artifact ID from Step 1>"
}

Sample Response

After the POST request to assign the write permission to the user is successful, you get the following response:
{
"@odata.context": "$metadata#BaseEntities",
"value": [
{
"guid": "aEy8Tl6yhl2lgQBrdDCbEZ",
"code": "FRS_200",
"message": "Successfully Updated ACLs"
}
]
}

Step 3. Import the latest process for matching external data

You require the latest MDMExternalMatch process to match external data with source records.
    1To request the latest MDMExternalMatch process, contact Informatica Global Customer Support.
    After the necessary approvals, you'll receive a ZIP file that contains the MDMExternalMatch process.
    2In Cloud Application Integration, click Explore.
    3Navigate to the Business360 folder.
    4Click Import.
    5On the Import Assets page, click Choose File, and select the ZIP file that contains the MDMExternalMatch process, and click Open.
    6In the Specify Import Job Details section, select Overwrite existing assets, excluding connections and runtime environments.
    7Click Import.

Step 4. Delete the write permission assigned to users

After you import the latest MDMExternalMatchProcess process, delete the write permission assigned to the user and set the process to read only so that users don't modify it.
To delete the write permission, you require the ID of the write permission. Use the GetACL API to get a list of permissions assigned to the process. You can identify the ID of the write permission based on the date when you assigned the permission.
To get a list of permissions assigned to the user, use the GetACL API and submit a GET request with the following URI:
GET <baseApiURL>/frs/api/v1/GetACL
To delete the write permission, use the UpdateACL API and submit a POST request with the following URI:
POST <baseApiURL>/frs/api/v1/UpdateACL

Sample Requests

Use the following GET request to get the list of permissions assigned to the user:
GET https://use4.dm-us.informaticacloud.com/frs/api/v1/GetACL(artifactId='<Artifact ID from Step 1>')
Use the following POST request to delete the write permission assigned to the user:
POST https://use4.dm-us.informaticacloud.com/frs/api/v1/UpdateACL
IDS-SESSION-ID: XXXXXXXXXXXXXXXXXXXXXX
Content-Type: application/json
{
"aces": [
{
"aceId": "<Write Permission ID>",
"operation": "DELETE_ACE",
"idsInfo": {
"id": "<User ID from Step 1>",
"type": "USER"
}
}
],
"artifactId": "<Artifact ID from Step 1>"
}

Sample Responses

After the GET request is successful, you get the following response:
{
"@odata.context": "$metadata#Collection(OData.frs.Ace)",
"value": [
{
"id": "9aMAeHngAJeezftidP23i9",
"artifactId": "aEy8Tl6yhl2lgQBrdDCbEZ",
"idsInfo": {
"id": "3VMH0uFUXQVddwVkjrfJUv",
"type": "USER"
},
"createdBy": "hIC3qRnQfqqj00zDeJnd6S",
"createdTime": "2025-02-28T07:42:51Z",
"lastUpdatedBy": "hIC3qRnQfqqj00zDeJnd6S",
"lastUpdatedTime": "2025-02-28T07:42:51Z",
"permission": {
"create": null,
"read": true,
"update": true,
"delete": true,
"execute": true,
"changePermission": true {{ }}
}
},
{
"id": "bmo9yhPqYc2fwBEHK9Timf",
"artifactId": "aEy8Tl6yhl2lgQBrdDCbEZ",
"idsInfo": {
"id": "8OSrngWzLw3bgwgRbqUy2f",
"type": "ORG"
},
"createdBy": "hIC3qRnQfqqj00zDeJnd6S",
"createdTime": "2025-02-28T07:44:33Z",
"lastUpdatedBy": "hIC3qRnQfqqj00zDeJnd6S",
"lastUpdatedTime": "2025-02-28T07:44:33Z",
"permission": {
"create": null,
"read": true,
"update": false,
"delete": false,
"execute": true,
"changePermission": true {\{}
}
}
},
{
"id": "<Write Permission ID>",
"artifactId": "aEy8Tl6yhl2lgQBrdDCbEZ",
"idsInfo": {
"id": "hIC3qRnQfqqj00zDeJnd6S",
"type": "USER"
},
"createdBy": "hIC3qRnQfqqj00zDeJnd6S",
"createdTime": "2025-03-03T07:11:08Z",
"lastUpdatedBy": "hIC3qRnQfqqj00zDeJnd6S",
"lastUpdatedTime": "2025-03-03T07:11:08Z",
"permission": {
"create": null,
"read": true,
"update": true,
"delete": false,
"execute": true,
"changePermission": true
}
}
]
}
Note: Identify the ID of the write permission based on the date when you assigned the permission to the user.
After the POST request to delete the write permission assigned to the user is successful, you get the following response:
{
"@odata.context": "$metadata#BaseEntities",
"value": [
{
"guid": "aEy8Tl6yhl2lgQBrdDCbEZ",
"code": "FRS_200",
"message": "Successfully Updated ACLs"
}
]
}

Step 5. Publish the process

After you delete the write permissions assigned to the user, publish the process to invoke or run it.
    1In Cloud Application Integration, click Explore.
    2Navigate to the Business360 folder.
    3Select the MDMExternalMatch process, and click Actions.
    4Click Publish.

Synchronize fields in a mapping

If you have a mapping that uses Business 360 FEP Connector to ingress or egress hierarchies, ensure that you synchronize the output or input fields of the mapping before you run it.
For more information about the purpose of synchronizing fields, see Business 360 FEP Connector for hierarchies.
  1. 1In Cloud Data Integration, open an existing mapping.
  2. 2If the mapping ingresses hierarchies, select the target transformation, and click the Target Fields tab.
  3. 3If the mapping egresses hierarchies, select the source transformation, and click the Fields tab.
  4. The following image shows the list of fields for a sample source transformation and highlights the Synchronize icon:
    The image displays the fields and field groups of a source transformation, that you can map to the output fields.
  5. 4Click Synchronize.
  6. The Synchronize dialog box appears.
  7. 5Select All fields, and click Synchronize.
  8. Verify the synchronized fields in the target field mapping.
  9. 6Save the mapping.

Reindex job to enhance search performance

To enhance search efficiency and performance, MDM SaaS runs an internal reindex job once for the existing business entities in your organization. The job indexes all records for search, and you can view the job on the My Jobs page.
The following image shows a sample internal reindex job that MDM SaaS runs:The My Jobs page shows a sample internal reindex job that MDM SaaS runs to reindex records in business entities.
For more information about the internal reindex job, contact Informatica Global Customer Support.