NetIQ Access Manager 3.2 SP3 Policy Guide

  NetIQ Access Manager 3.2 SP3 Policy Guide
    Managing Policies
      Selecting a Policy Type
      Managing Policies
      Viewing Policies
      Managing Policy Containers
      Managing a Rule List
      Adding Policy Extensions
      Enabling Policy Logging
    Creating Role Policies
      Understanding RBAC in Access Manager
      Creating Roles
      Example Role Policies
      Creating Access Manager Roles in an Existing Role-Based Policy System
      Mapping Roles between Trusted Providers
      Enabling and Disabling Role Policies
      Importing and Exporting Role Policies
    Creating Authorization Policies
      Designing an Authorization Policy
      Creating Access Gateway Authorization Policies
      Sample Access Gateway Authorization Policies
      Creating Web Authorization Policies for J2EE Agents
      Creating Enterprise JavaBean Authorization Policies for J2EE Agents
      Conditions
      Importing and Exporting Authorization Policies
    Creating Identity Injection Policies
      Designing an Identity Injection Policy
      Configuring an Identity Injection Policy
      Configuring an Authentication Header Policy
      Configuring a Custom Header Policy
      Configuring a Custom Header with Tags
      Specifying a Query String for Injection
      Injecting into the Cookie Header
      Configuring an Inject Kerberos Ticket Policy
      Importing and Exporting Identity Injection Policies
      Sample Identity Injection Policy
    Creating Form Fill Policies
      Understanding an HTML Form
      Creating a Form Fill Policy for the Sample Form
      Implementing Form Fill Policies
      Creating and Managing Shared Secrets
      Importing and Exporting Form Fill Policies
      Configuring a Form Fill Policy for Forms With Scripts
    Creating External Attribute Source Policies
      Configuring an External Attribute Source Policy
    Troubleshooting Access Manager Policies
      Turning on Logging for Policy Evaluation
      Understanding Policy Evaluation Traces
      Common Configuration Problems That Prevent a Policy from Being Applied as Expected
      The Policy Is Using Old User Data
      Form Fill and Identity Injection Silently Fail
      Checking for Corrupted Policies
      Policy Page Timeout
      Policy Creation and Storage
      Policy Distribution
      Policy Evaluation: Access Gateway Devices
    Legal Notice