Novell ACCESS MANAGER 3.1 SP2 - ACCESS GATEWAY GUIDE 2010 Manual page 30

Access gateway guide
Hide thumbs Also See for ACCESS MANAGER 3.1 SP2 - ACCESS GATEWAY GUIDE 2010:
Table of Contents

Advertisement

To delete an existing authentication procedure, select the procedure, then click Delete.
Continue with
If the procedure is used by a resource, it cannot be deleted until it is not being used to
protect resources. An authentication procedure must exist for each contract. If you delete
an authentication procedure for a contract without also deleting the contract, the system
automatically re-creates an authentication procedure for the contract.
4 To specify the method for obtaining the credentials, fill in the following fields:
Contract: Select the contract that you want to use for this protected resource. This needs to be
a contract that supports basic authentication credentials such as Name/Password- Basic or
Secure Name/Password-Basic.
Non-Redirected Login: Select this option to use the SOAP back channel to verify the user's
credentials rather than a redirected request to the Identity Server.
Realm: Specify a name that your users can use to identify the site that they are authenticating
to. This could be your company name or the name of the application. The realm is displayed as
a heading when the application requests a basic authentication.
Redirect to Identity Server When No Authentication Header Is Provided: The response
should provide an authentication header. If the first request does not contain the authentication
header, you can select this option to allow the first request to be redirected to the Identity
Server.
5 Click OK.
6 For the Authentication Procedure, select the authentication procedure you created or modified
in
Step
7 Click OK.
8 Click Devices > Access Gateways, then update the Access Gateway.
9 (Optional) For some configuration scenarios that use this feature, see
"Configuring Protected Resource for a SharePoint Server" on page 38
"Configuring a Protected Resource for a SharePoint Server with an ADFS Server" on
page 39
"Configuring a Protected Resource for Outlook Web Access" on page 42
"Configuring a Protected Resource for a Novell Teaming 2.0 Server" on page 44
30
Novell Access Manager 3.1 SP2 Access Gateway Guide
Step
7.
4.

Advertisement

Table of Contents
loading

Table of Contents