Previous Topic: Define a RealmNext Topic: Define Time Ranges for ACEs


Map Security Objects to a Realm

Use the Name Mapping tab page to specify the secured objects or security principals that are being mapped to a specified realm.

To map security objects to a realm

  1. Select Enabled from the State drop-down list. (The default is Disabled.)

    URI to realm mapping is enabled.

  2. Specify the source uniform identifier (URI) for a particular computer or user in the URI field. This field is not case sensitive.

    For example, comp8618.ca.com specifies a single URI and comp861[789]\.ca\.com specifies a range of URIs to be mapped. (See the examples at the end of this procedure.)

  3. Select the URI type from the URI Type drop-down list. Valid values are Exact Match (literal) and Pattern Match (regular expression).

    Default: Exact Match

  4. Select a realm from the Realm drop-down list.
  5. Click Add.

    The URI and the URI type are added to the Name Mapping table.

  6. (Optional) Select a URI in the Name Mapping table and click Remove to remove the URI from the list.
  7. (Optional) Click Local to set the name mapping configuration policies to Locally Managed.
  8. (Optional) Click Default to reset the name mapping configuration policies to the original default values.
  9. Click Check to perform immediate validation of the data entered without committing the data.
  10. If cross-field or cross-table validation is successful, click Apply.
  11. Click the Time Ranges tab.

Examples

URI

URI Type

Realm

Description

comp8618.ca.com

Exact Match

myrealm

Map a specific URI to myrealm.

comp861[789]\.ca\.com

Pattern Match

myrealm

Map comp8617.ca.com, comp8618.ca.com, and comp8619.ca.com to myrealm.