NetIQ Access Manager 3.2 SP3 Policy Guide
- NetIQ Access Manager 3.2 SP3 Policy Guide
- Managing Policies
- Selecting a Policy Type
- Managing Policies
- Viewing Policies
- Managing Policy Containers
- Managing a Rule List
- Adding Policy Extensions
- Enabling Policy Logging
- Creating Role Policies
- Understanding RBAC in Access Manager
- Creating Roles
- Example Role Policies
- Creating Access Manager Roles in an Existing Role-Based Policy System
- Mapping Roles between Trusted Providers
- Enabling and Disabling Role Policies
- Importing and Exporting Role Policies
- Creating Authorization Policies
- Designing an Authorization Policy
- Creating Access Gateway Authorization Policies
- Sample Access Gateway Authorization Policies
- Creating Web Authorization Policies for J2EE Agents
- Creating Enterprise JavaBean Authorization Policies for J2EE Agents
- Conditions
- Importing and Exporting Authorization Policies
- Creating Identity Injection Policies
- Designing an Identity Injection Policy
- Configuring an Identity Injection Policy
- Configuring an Authentication Header Policy
- Configuring a Custom Header Policy
- Configuring a Custom Header with Tags
- Specifying a Query String for Injection
- Injecting into the Cookie Header
- Configuring an Inject Kerberos Ticket Policy
- Importing and Exporting Identity Injection Policies
- Sample Identity Injection Policy
- Creating Form Fill Policies
- Understanding an HTML Form
- Creating a Form Fill Policy for the Sample Form
- Implementing Form Fill Policies
- Creating and Managing Shared Secrets
- Importing and Exporting Form Fill Policies
- Configuring a Form Fill Policy for Forms With Scripts
- Creating External Attribute Source Policies
- Configuring an External Attribute Source Policy
- Troubleshooting Access Manager Policies
- Turning on Logging for Policy Evaluation
- Understanding Policy Evaluation Traces
- Common Configuration Problems That Prevent a Policy from Being Applied as Expected
- The Policy Is Using Old User Data
- Form Fill and Identity Injection Silently Fail
- Checking for Corrupted Policies
- Policy Page Timeout
- Policy Creation and Storage
- Policy Distribution
- Policy Evaluation: Access Gateway Devices
- Legal Notice