Assigning An Authorization Policy To A Protected Resource - Novell ACCESS MANAGER 3.1 SP1 - GATEWAY GUIDE Manual

Access gateway guide
Hide thumbs Also See for ACCESS MANAGER 3.1 SP1 - GATEWAY GUIDE:
Table of Contents

Advertisement

2 On the Authentication Procedure line, click the Edit Authentication Procedure icon.
3 Click New, specify a name, then click OK.
4 To specify the method for obtaining the credentials, fill in the following fields:
Contract: Select the contract that you have configured for this protected resource. This needs
to be a contract that supports name and password credentials.
Non-Redirected Login: Select this option to use the SOAP back channel to verify the user's
credentials rather than a redirected request to the Identity Server.
Realm: Specify a name that your users can use to identify the site that they are authenticating
to. This could be your company name or the name of the application. This is what displays as a
heading when the application requests a basic authentication.
Redirect to Identity Server When No Authentication Header Is Provided: The response
should provide an authentication header. If the first request does not contain the authentication
header, you can select this option to allow the first request to be redirected to the Identity
Server.
5 Click OK.
6 (Conditional) If you have more than one realm to query for credentials, repeat
Step
5.
7 Click OK.
8 Click Devices > Access Gateways, then update the Access Gateway.
9 (Optional) For some configuration scenarios that use this feature, see
"Configuring Protected Resource for a SharePoint Server" on page 30
"Configuring a Protected Resource for a SharePoint Server with an ADFS Server" on
page 31
"Configuring a Protected Resource for Outlook Web Access" on page 34
"Configuring a Protected Resource for a Novell Teaming 2.0 Server" on page 36
1.4.5 Assigning an Authorization Policy to a Protected
Resource
An Authorization policy specifies conditions that a user must meet in order to access a resource. The
Access Gateway enforces these conditions. The policy can specify the criteria a user must meet
either to allow access or to deny access.
1 Click Access Gateways > Edit > [Name of Reverse Proxy] > [Name of Proxy Service] >
Protected Resources > [Name of Protected Resource] > Authorization.
Configuring the Access Gateway to Protect Web Resources
Step 4
and
25

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ACCESS MANAGER 3.1 SP1 - GATEWAY GUIDE and is the answer not in the manual?

Questions and answers

Table of Contents