13.8.2. Configure Security Mapping in a Security Domain

To configure security mapping settings for a security domain, log into the management console and follow this procedure.

Procedure 13.12. Setup Security Mapping Settings in a Security Domain

  1. Open the security domain's detailed view.

    1. Click the Configuration label at the top of the management console.
    2. In a managed domain, select a profile from the Profile selection box at the top left.
    3. Expand the Security menu, and select Security Domains.
    4. Click View for the security domain you want to edit.
  2. Navigate to the Mapping subsystem configuration.

    Select the Mapping label at the top of the screen.
    The configuration area is divided into two areas: Modules and Details. The mapping module is the basic unit of configuration. A security domain can include several mapping modules, each of which can include several attributes and options.
  3. Add a security mapping module.

    Click Add.
    Fill in the details for your module. The Code is the class name of the module. The Type field refers to the type of mapping this module performs. Allowed values are principal, role, attribute or credential.
  4. Edit a security mapping module

    After you have added your module, you can modify its Code or Type.
    1. Select the Attributes tab.
    2. Click Edit in the Details section of the screen.
  5. Optional: Add, edit, or remove module options.

    To add options to your module, click its entry in the Modules list, and select the Module Options tab in the Details section of the page. Click Add, and provide the key and value for the option.
    To edit an option that already exists, click Remove to remove it, and add it again with the new value.
    Use the Remove button to remove an option.

Your security mapping module is added to the security domain, and is immediately available to applications which use the security domain.