Authorization Policy: Specifies the conditions a user must meet to be allowed access to a protected
resource. You define the conditions, and the Access Gateway enforces the Authorization policies.
For example, you can assign roles to your users, and use these roles to grant and deny access to
resources.
Identity Injection Policy: Specifies the information that must be injected into the HTTP header. If
the Web application has been configured to look for certain fields in the header and the information
cannot be found, the Web application determines whether the user is denied access or redirected.
The Web application defines the requirements for Identity Injection. The Identity Injection policies
allow you to inject the required information into the header.
Form Fill Policy: Allows you to manage forms that Web servers return in response to client
requests. Form fill allows you to prepopulate fields in a form on first login and then securely save
the information in the completed form to a secret store for subsequent logins. The user is prompted
to reenter the information only when something changes, such as a password.
These policies allow you to design a custom access policy for each protected resource:
Resources that share the same protection requirements can be configured as a group. You set up
the policies, and then add the URLs of each resource that requires these policies.
A resource that has specialized protection requirements can be set up as a single protected
resource. For example, a page that uses Form Fill is usually set up as a single protected
resource.
This section describes the following tasks:
Section 1.4.1, "Setting Up a Protected Resource," on page 20
Section 1.4.2, "Understanding URL Path Matching," on page 23
Section 1.4.3, "Using a Query String in the URL Path," on page 23
Section 1.4.4, "Modifying Authentication Procedures," on page 24
Section 1.4.5, "Assigning an Authorization Policy to a Protected Resource," on page 25
Section 1.4.6, "Assigning an Identity Injection Policy to a Protected Resource," on page 26
Section 1.4.7, "Assigning a Form Fill Policy to a Protected Resource," on page 27
Section 1.4.8, "Assigning a Policy to Multiple Protected Resources," on page 29
1.4.1 Setting Up a Protected Resource
To configure a protected resource:
1 Click Access Gateways > Edit > [Name of Reverse Proxy] > [Name of Proxy Service] >
Protected Resources.
2 Either click the name of an existing resource or click New, then specify a display name for the
resource.
20
Novell Access Manager 3.1 SP1 Access Gateway Guide
Need help?
Do you have a question about the ACCESS MANAGER 3.1 SP1 - GATEWAY GUIDE and is the answer not in the manual?