Previous Topic: Use Cases for Defining Application Security Policies Using Application ObjectsNext Topic: Realms


Domains

This section contains the following topics:

Policy Domain Overview

Domains and User Membership

How to Configure a Policy Domain

Add CA IdentityMinder Environments to a Domain

Disable Global Policy Processing for a Domain

Modify a Domain

Delete a Domain

Policy Domain Overview

A policy domain is a logical grouping of resources associated with one or more user directories. In addition, policy domains require one or more administrator accounts that can make changes to the objects within the policy domain. Policy domains contain realms, rules, responses, and policies (and optionally, rule groups and response groups). An administrator with the appropriate privileges assigns a policy domain to one or more administrators. For information about administrator privileges, see Policy Server Administrators.

The resources in a policy domain can be grouped in one or more realms. A realm is a set of resources with a common security (authentication) requirement. Access to resources is controlled by rules, which are associated with the realm that contains the resource. The following diagram illustrates a small policy domain which contains realms and their associated rules, as well as a rule group, response group, and a pair of responses.

Graphic showing an example of a domain and the related SiteMinder objects

By grouping realms and rules in a policy domain, you can provide organizations with a secure domain for their resources. In the policies section, you learn how to create policies within a policy domain to control access to the policy domain’s resources.

In the sample diagram below, a Marketing policy administrator who is specified in the Marketing policy domain can manage the Marketing Strategy and Marketing Projects realms. The policy domain ensures that the Engineering administrator, who does not have administrative privileges to manage the Marketing policy domain, cannot control resources belonging to the Marketing department. However, the Marketing policy domain is associated with a user directory that contains engineering users.

If the administrator for the Marketing department creates a policy within the Marketing policy domain that allows Engineering staff to access the resource Project 2.html, engineering users may access the resource.

Graphic showing an example of users and administrators access domains

More information:

Policies

Domains and User Membership

Besides acting as a container for domain objects, policy domains also connect to user directories. The Policy Server authenticates users based on the requirements of the realm in which the target resource resides. In order to authenticate a user, the Policy Server must find the user directory where a user is defined. The Policy Server does this by locating the policy domain to which a realm belongs. From the policy domain, the Policy Server queries the user directories specified in the policy domain’s search order.

The search order is defined when you add user directory connections to a policy domain. The order in which you add directory connections determines the order that the Policy Server uses to search for a user. For example, if you set up policy domain for a company migrating user data from a WinNT directory to an LDAP directory, and you want the Policy Server to search in the new LDAP directory first, then look in the WinNT user directory, add the LDAP directory connection to the policy domain first, then add the WinNT user directory connection.

How to Configure a Policy Domain

You configure a domain to create a logical grouping of resources with one or more user directories. Configuring a domain requires you to:

Note: You can edit a policy domain’s properties if you need to add a realm in the future.

The following process lists the steps for configuring a new policy domain:

  1. Configure the Policy Domain
  2. Assign User Directories
  3. Create a Realm

More information:

Realms

Configure a Policy Domain

You create a policy domain to protect logical groupings of resources.

Follow these steps:

  1. Click Policies, Domain.
  2. Click Domains.

    The Domains page appears.

  3. Click Create Domain.

    The Create Domain page appears.

    Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.

  4. Type the name and a description of the policy.
  5. Add User Directories and Realms.
  6. Click Submit.

    You have defined a policy domain.

More information:

Create a Realm

Assign User Directories

You can add one or more user directories to a policy domain. The Policy Server authenticates users by comparing the credentials that they enter to the credentials that are stored in the user directories. The Policy Server searches the user directories in the same order that they are listed in the policy domain.

To add user directories to a policy domain

  1. Click Policies, Domain.
  2. Click Domains.

    The Domains page appears.

  3. Specify the search criteria and click Search.

    A list of domains that match the search criteria appears.

  4. Click the name of the domain that you want to modify.

    The View Domain page appears.

  5. Click Modify.

    The settings and controls become active.

  6. In the General tab, click Add/Remove.

    The Choose user directories page appears.

  7. Select one or more user directories from the list of Available Members, and click the right-facing arrows.

    The user directories are removed from the list of Available Members and added to the list of Selected Members.

    Note: To select more than one member at one time, hold down the Ctrl key while you click the additional members. To select a block of members, click the first member and then hold down the Shift key while you click the last member in the block.

  8. Click OK.

    The selected user directories are listed under User Directories.

    Note: To create a new user directory and add it to the domain, click Create.

  9. Click Submit.

    The selected user directories are added to the policy domain.

Create a Realm

Realms are created in a domain and are associated with a Web Agent. Realms use resource filters to group resources that have similar security requirements and share a common authentication scheme.

More information:

Realms

Configure a Realm with a SiteMinder Web Agent

When you create a domain, you can create one or more realms in the domain and associate them with a Web Agent or Agent group. Realms group resources that have similar security requirements and share a common authentication scheme.

Note: The following procedure assumes that you are creating an object. You can also copy the properties of an existing object to create an object.

Follow these steps:

  1. Click Policies, Domain.
  2. Click Realms.

    The Realms page appears.

  3. Click Create Realm.

    The Create Realm: Select Domain page appears.

  4. Select a domain, and click Next.

    The Create Realm: Define Realm page appears.

  5. Type the name and a description of the realm.
  6. Click the ellipsis button to select an agent.

    The Select an Agent page appears.

  7. Select a Web Agent or Agent group, and click OK.
  8. Specify the remaining resource properties.
  9. Create new rules or delete existing rules.
  10. Create new sub-realms or delete existing sub-realms.
  11. Specify the session properties.
  12. Specify the authorization directory mappings and types of events the realm must process.
  13. Click Finish.

    The Realm is created.

More information:

Duplicate Policy Server Objects

Configure a Realm with a RADIUS Agent

When you create a domain, you can create one or more realms in the domain and associate them with a Radius Agent or Agent group. Realms group resources that have similar security requirements and share a common authentication scheme.

Note: The Administrative UI lets you configure realms protected by a RADIUS Agent. These realms do not require all of the same information that is required for a CA SiteMinder® Web Agent realm.

Note: The following procedure assumes that you are creating an object. You can also copy the properties of an existing object to create an object.

To create a realm in a domain and associate it with a RADIUS Agent or Agent group

  1. Click Policies, Domain.
  2. Click Realms.

    The Realms page appears.

  3. Click Create Realm.

    The Create Realm: Select Domain page appears.

  4. Select a domain, and click Next.

    The Create Realm: Define Realm page appears.

  5. Type the name and a description of the realm.
  6. Click the ellipsis button to select an agent.

    The Select an Agent page appears.

  7. Select a RADIUS Agent or Agent group, and click OK.
  8. Specify the remaining resource properties.
  9. Create new rules or delete existing rules.
  10. Specify the session properties.
  11. Click Finish.

    The Realm is created and associated with the selected RADIUS Agent or Agent group.

More information:

Duplicate Policy Server Objects

Add CA IdentityMinder Environments to a Domain

Adding a CA IdentityMinder environment and the associated user directories to a domain makes available CA IdentityMinder roles to policies.

Follow these steps:

  1. Click Policies, Domain.
  2. Click Domains.
  3. Specify search criteria and click Search to locate the domain you want.
  4. Click the name of the domain to which you want to add the environment.
  5. Click Modify.
  6. If the users that are associated with the environment are not bound to the domain, add the respective user directories.
  7. Click Add/Remove in the IDM Environments section.
  8. Select the IDM Environments you want and click OK.
  9. Click Submit.

    The CA IdentityMinder environments are added to the domain. The roles associated with the environments are available to all policies created in the domain.

Disable Global Policy Processing for a Domain

Global policies let you associate responses with particular resources and events across all domains. By default, global policies apply to all of the resources in a policy domain.

To disable global policies for a specific domain

  1. Open the domain.
  2. Clear the Global Policies Apply check box, and then click Submit.

    Global policies no longer apply to the resources in this domain.

More information:

Global Policies, Rules, and Responses

Modify a Domain

You can change the name, description, user directory connections and administrators associated with a policy or affiliate domain. All other features of a domain are a result of peripheral configuration.

Delete a Domain

Important! Deleting a domain destroys all of the domain user directories, administrator connections, and objects bound to the domain, such as rules, realms, responses, policies, or affiliates.

It may take a short amount of time for all deleted objects to be removed from caches.