Previous Topic: Directory MappingNext Topic: Identity Mappings Configuration


Directory Mapping Overview

The Policy Server assumes that a user is authenticated and authorized against the same user directory. However, users can be authenticated against one directory, and authorized against a separate directory. This feature is called directory mapping.

You can map a central directory that stores authentication information with separate distributed user directories that store authorization information. The authorization directories are associated with particular network applications. The mappings locate authenticated users in separate authorization directories.

Note: Directory mapping does not support Impersonation. The user being impersonated, must be uniquely present in the authentication directories that are associated with the domain or the impersonation fails.

Mapping from an authentication directory to an authorization directory is a three-step process.

  1. Set up user directory connections.
  2. Configure a directory mapping.
  3. Assign a directory mapping to a realm. A user is authorized against this directory for specific network applications.

For example, all the users in the company are authenticated against one central user directory. The marketing organization is authorized against a separate user directory. You can configure a directory mapping between the authentication and the marketing authorization user directories then create a realm for the marketing application. The realm uses the authorization directory defined in the mapping. When a user tries to access the marketing application, the user is authenticated against the central user directory and authorized against the marketing user directory.

The following diagram shows this example.

Graphic showing a user being authenticated against the central user directory but authorized against the marketing user directory

More information:

Realms

How to Configure a CA Directory User Directory Connection

Directory Mapping Methods

Authorization Identity Mappings

Authorization Identity Mapping is a directory mapping that authenticates users against one directory and authorize users against a separate directory.

Validation Identity Mappings

Validation Identity Mapping is a directory mapping that authenticates users against one directory and validate users against a separate directory. You map an authentication user directory that is connected to one Policy Server to a validation user directory that is connected to a different Policy Server.

Directory Mapping Methods

You can map authentication directories with authorization and validation directories using the following methods:

Identity Mappings

Identity mappings let you configure multiple target user directories and use custom search criteria. Identity Mappings provide greater flexibility than the legacy directory mappings.

Legacy (Auth/Az and AuthValidate) Directory Mappings

The legacy Auth/Az and AuthValidate directory mappings available in previous releases are still available in this release.

More information:

Identity Mappings Configuration

Legacy Directory Mapping Configuration

Directory Mapping Requirements

For legacy directory mappings, the user directory connections to the Policy Server must exist for the authentication directory and the authorization or validation directory. Identity mappings do not require existing user directory connections.

More information:

User Directory Connections Overview