Pulse Secure Appliances and Red Hat Identity Management Integration
The flow for the setup is:
Config Auth Server → Define User Role → Define Resource Profile → Define User Realm → Define Role Mapping for the Realm → Config Sign In Policy/URL
ATTENTION: Because the described GID-based integration is matching numeric GIDs (and not GroupIDs by name), the IdM administrator must make sure that the group the...
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
