Identity Mappings provide an enhanced method of mapping users from a Source Directory to a Target Directory using custom search criteria. You can use Identity Mapping for both user authorization and user validation.
Identity Mapping enables custom search and also lets you control the order of mapping rules using different identity mapping entry objects.
Note: For more information about Enhanced Directory Mapping, see the Policy Server Configuration Guide.
Copyright © 2012 CA Technologies.
All rights reserved.
|
|