Configure a certificate mapping that lets SOA Security Manager determine how to compare user certificate information with the information stored in the user directory.
To configure a certificate mapping
The Create Certificate Mapping pane opens.
Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.
When entering the DN, escape reserved special characters with a backslash (\). Special characters include:
More information about reserved special characters for DNs exists at http://www.faqs.org/rfcs/rfc2253.html.
Note: Issuer DNs cannot exceed 255 characters if a relational database is used as a policy store and cannot exceed 1000 characters if an LDAP directory is used as a policy store.
For LDAP directories only, you can configure the Policy Server to verify that the certificate the user presents matches the certificate stored in the user record in the user directory. The Certificate Required in Directory check box lets you require this verification.
Note: The certificate in the LDAP directory must be base64-encoded without embedded newlines.; Binary certificates, PEM certificates, and multiline base64-encoded certificates are not supported.
If you do not select CRLs, you can use OCSP.
The Create Certificate Mapping task is submitted for processing.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |