You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: downstream/modules/platform/con-gw-authenticator-map-examples.adoc
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,8 @@
6
6
7
7
Use the following examples to explore the different conditions, like groups and attribute values you can implement to control user access to the platform.
8
8
9
-
.Add users to an organization based on an attribute
9
+
*Add users to an organization based on an attribute*
10
+
10
11
In this example, you will add a user to the *Networking* organization if they have an `Organization` attribute with the value of `Networking`:
11
12
12
13
image::am-org-mapping-full-annotation.png[Add users to an organization mapping example fully annotated with callout numbers that correlate with the following list that describes the function of each field]
@@ -21,7 +22,8 @@ image::am-org-mapping-full-annotation.png[Add users to an organization mapping e
21
22
. The name of the *Organization* to which you are adding members is `Networking`.
22
23
. Users are added to the *Networking* organization with the `Organization Member` role.
23
24
24
-
.Add users to a team based on the users group
25
+
*Add users to a team based on the users group*
26
+
25
27
In this example, you will add user to the `Apple` team if they have either of the following groups:
image::am-apple-team-map-example.png[Add user to a team mapping example]
38
40
39
-
.Do not escalate privileges
41
+
*Do not escalate privileges*
40
42
41
43
In this example, you never escalate users to a superuser. But note, this rule does not revoke a user’s superuser permission because the revoke option is not set.
42
44
43
45
image::am-do-not-escalate-privileges.png[Do not escalate privileges mapping example]
44
46
45
-
.Escalate privileges based on a user having a group
47
+
*Escalate privileges based on a user having a group*
46
48
47
49
In this example, you escalate user privileges to superuser if they belong to the following group:
Since maps are executed in order, it is possible to create exceptions. Expanding on the previous example for __Do not escalate privileges__, you can add another rule with a higher order, such as, __Escalate privileges__.
Copy file name to clipboardExpand all lines: downstream/modules/platform/con-gw-authenticator-map-triggers.adoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,15 +28,15 @@ See the *Operation* field to determine the behavior of the trigger if more than
28
28
Group identifiers must be entered in lowercase. For example, `cn=johnsmith,dc=example,dc=com` instead of `CN=johnsmith,DC=example,DC=com`.
29
29
====
30
30
+
31
-
Attribute:: The map is true or false based on a users attributes coming from the source system. See link:{URLCentralAuth}/gw-configure-authentication#gw-authenticator-map-examples[Authenticator map examples] for information on using *Attribute* triggers.
31
+
Attribute:: The map is true or false based on a users attributes coming from the source system. See link:{URLCentralAuth}/gw-configure-authentication#gw-authenticator-map-examples[Authenticator map examples] for information about using *Attribute* triggers.
32
32
+
33
33
When defining an attribute trigger, the authentication mapping expands to include the following selections:
34
34
+
35
35
* *Operation:* This field includes conditional settings that trigger the handling of the rule based on the specified *Attribute* criteria. In version {PlatformVers} this field indicates what will happen if the source system returns a list of attributes instead of a single value. For example, if the source system returns multiple emails for a user and *Operation* was set to *and*, all of the given emails must match the *Comparison* for the trigger to be _True_. If *Operation* was set to *or*, any of the returned emails will set the trigger to _True_ if they match the *Comparison* in the trigger.
36
36
+
37
37
[NOTE]
38
38
====
39
-
If you would like to experiment with multiple attribute maps you can do that through the API but the UI form will remove multi-attribute maps if the authenticator is saved through the UI. When adding multiple attributes to a map, the *Operation* will also apply to the attributes.
39
+
If you want to experiment with multiple attribute maps you can do that through the API but the UI form will remove multi-attribute maps if the authenticator is saved through the UI. When adding multiple attributes to a map, the *Operation* will also apply to the attributes.
40
40
====
41
41
+
42
42
* *Attribute:* The name of the attribute coming from the source system this trigger will be evaluated against. For example, if you wanted the trigger to fire based on the user's last name and the last name field in the source system was called `users_last_name` you would enter the value ‘users_last_name’ in this field.
@@ -46,10 +46,10 @@ If you would like to experiment with multiple attribute maps you can do that thr
46
46
** *matches*: The *Value* on the trigger is treated as a python regular expression and does an link:https://docs.python.org/3/library/re.html#re.match[Regular expression match (re.match)] (with case ignore on) between the specified *Value* and the value returned from the source system. For example, if the trigger's *Value* was ‘Jo’ the trigger would return _True_ if the value from the source was ‘John‘ or ‘Joanne‘ or any other value which matched the regular expression ‘Jo’. The trigger would return _False_ if the sources value for the attribute was ‘Dan’ because ‘Dan’ does not match the regular expression ‘Jo’.
47
47
** *ends with*: The trigger will see if the value provided by the source ends with the specified *Value* of the trigger. For example, if the source provided a value of ‘John’ the trigger would be _True_ if its *Value* was set to ‘n’ or ‘on’. The trigger would be _False_ if its *Value* was set to ‘z’ because the value ‘John’ coming from the source does not end with the value ’z’ specified by the trigger.
48
48
** *equal*: The trigger will see if the value provided by the source is equal to (in its entirety) the specified *Value* of the trigger. For example, if the source returned the value ‘John’, the trigger would be _True_ if its *Value* was set to ‘John’. Any value other than ‘John’ returned from the source would set this trigger to _False_.
49
-
** *in*: The *in* condition will see if the value matches one of several values. When *in* is specified as the *Comparison*, the *Value* field can be a commaseparated list. For example, if a trigger had a *Value* of ‘John,Donna’ the trigger would be _True_ if the attribute coming from the source had either the value ‘John’ or ‘Donna’. Otherwise, the trigger would be _False_.
49
+
** *in*: The *in* condition checks if the value matches one of several values. When *in* is specified as the *Comparison*, the *Value* field can be a comma-separated list. For example, if a trigger had a *Value* of ‘John,Donna’ the trigger would be _True_ if the attribute coming from the source had either the value ‘John’ or ‘Donna’. Otherwise, the trigger would be _False_.
50
50
** *Value*: The value that a users attribute will be matched against based on the *Comparison* field. See examples in the *Comparison* definition in this section.
51
51
+
52
52
[NOTE]
53
53
====
54
-
If the *Comparison* type is *in*, this field can be a commaseparated list (without spaces).
54
+
If the *Comparison* type is *in*, this field can be a comma-separated list (without spaces).
Copy file name to clipboardExpand all lines: downstream/modules/platform/con-gw-understanding-authenticator-mapping.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@
4
4
5
5
= Understanding authenticator mapping
6
6
7
-
Authentication:: Validates a user’s identity, typically through a username and password or a trust system.
7
+
Authentication:: Validates a user's identity, typically through a username and password or a trust system.
8
8
Authorization:: Determines what an authenticated user can do once they are authenticated.
9
9
10
10
In {PlatformNameShort}, authenticators manage authentication, validating users and returning details such as their username, first name, email, and group memberships (for example, LDAP groups). Authorization comes from the authenticator’s associated maps.
Copy file name to clipboardExpand all lines: downstream/modules/platform/proc-controller-apps-create-tokens.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,4 +51,4 @@ You can verify that the application now shows the user with the appropriate toke
51
51
Your token should be displayed in the list of tokens associated with the application you chose.
52
52
53
53
.Additional resources
54
-
If you are a system administrator and have to create or remove tokens for other users, see the revoke and create commands in xref:ref-controller-token-session-management[Token and session management].
54
+
* xref:ref-controller-token-session-management[Token and session management]
Copy file name to clipboardExpand all lines: downstream/modules/platform/proc-controller-team-mapping.adoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,16 @@
1
1
:_mod-docs-content-type: PROCEDURE
2
2
3
-
[id="ref-controller-team-mapping"]
3
+
[id="proc-controller-team-mapping"]
4
4
5
5
= Team mapping
6
6
7
7
Team mapping is the mapping of team members (users) from authenticators.
8
8
9
-
You can define the options for each team’s membership. For each team, you can specify which users are automatically added as members of the team and also which users can administer the team.
9
+
You can define the options for each team's membership. For each team, you can specify which users are automatically added as members of the team and also which users can administer the team.
10
10
11
11
Team mappings can be specified separately for each account authentication.
12
12
13
-
When Team mapping is positively evaluated, a specified team and its organization are created, if they don’t exist if the related authenticator is allowed to create objects.
13
+
When Team mapping is positively evaluated, a specified team and its organization are created, if they don't exist if the related authenticator is allowed to create objects.
14
14
15
15
16
16
.Procedure
@@ -19,7 +19,7 @@ When Team mapping is positively evaluated, a specified team and its organization
19
19
. Select *Team* from the *Add authentication mapping* list.
20
20
. Enter a unique rule *Name* to identify the rule.
21
21
. Select a *Trigger* from the list. See xref:gw-authenticator-map-triggers[Authenticator map triggers] for more information about map triggers.
22
-
. Select *Revoke* to remove the user’s access to the selected organization role and deny user access to the system when the trigger conditions are not matched.
22
+
. Select *Revoke* to remove the user's access to the selected organization role and deny user access to the system when the trigger conditions are not matched.
23
23
. Select the *Team* and *Organization* to which matching users are added or blocked.
24
24
. Select a *Role* to be applied or removed for matching users (for example, *Team Admin* or *Team Member*).
0 commit comments