5.14.2. Configure Security Mapping in a Security Domain
Procedure 5.11. Setup Security Mapping Settings in a Security Domain
Open the security domain's detailed view.Click the Profiles label at the top right of the management console. This tab is labeled Profile in a standalone server. In a managed domain, select the profile to modify from the Profile selection box at the top left of the Profile view. Click the Security menu item at the left, and click Security Domains from the expanded menu. Click the View link for the security domain you want to edit.
Navigate to the Mapping subsystem configuration.Click the Mapping label at the top of the view if it is not already selected.The configuration area is divided into two areas: Modules and Details. The mapping module is the basic unit of configuration. A security domain can include several mapping modules, each of which can include several attributes and options.
Add a module.Click the Add button to add a security mapping module. Fill in the details for your module. The Code is the class name of the module. The Type field refers to the type of mapping this module performs. Allowed values are principal, role, attribute or credential.After you have added your module, you can modify its Code or Type by clicking the button in the Details section of the screen. Be sure the Attributes tab is selected.
Optional: Add, edit, or remove module options.If you need to add options to your module, click its entry in the Modules list, and select the Module Options tab in the Details section of the page. Click the button, and provide the key and value for the option. To edit an option that already exists, click the Remove label key to remove it, and add it again with the new value. Use the button to remove an option.
Your security mapping module is added to the security domain, and is immediately available to applications which use the security domain.