![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |
Figure Authentication Policies illustrates how to apply the authentication policies for an incoming request.Figure 20 Authentication PoliciesTask D Configure Shared ResourceSee Configure Shared Resource for details.Task E Create PolicySee Create Policy for details.Task F Register PolicySee Register Policy for detailed steps. You must choose the correct type and subtype to register the policy as shown in the following table:
Task G Apply PolicySee Apply Policy for details.
Figure Authorization Policies illustrates how to apply an authorization policy based on the role or how you can apply an OAuth policy.Figure 21 Authorization PoliciesTask A Configure Shared Resource.See Configure Shared Resource for details.Task B Create PolicySee Create Policy for details.Task C Register PolicySee Register Policy for detailed steps. You must choose the correct type and subtype to register the policy as shown in the following table:
Task D Apply PolicySee Apply Policy for details.
Figure 22 Sign PolicyFigure VerifySignature Policy shows how to apply a verify signature policy:Figure 23 VerifySignature PolicyTask A Configure Shared ResourceSee Configure Shared Resource for details.Task B Create PolicySee Create Policy for details.Task C Register PolicySee Register Policy for detailed steps. You must choose the correct type and subtype to register the policy as shown in the following table:
Task D Apply PolicySee Apply Policy for details.
Figure Encryption Policy shows how to apply an encrypt policy.Figure 24 Encryption PolicyFigure Decrypt Policy shows how to apply the decrypt policy.Figure 25 Decrypt PolicyTask A Configure Shared ResourceSee Configure Shared Resource for details.Task B Create PolicySee Create Policy for details.Task C Register PolicySee Register Policy for detailed steps. You must choose the correct type and subtype to register the policy as shown in the following table:
Task D Apply PolicySee Apply Policy for details.
Figure CredentialMapping Policies illustrates how you can apply a credential mapping policy.Figure 26 CredentialMapping Policies
![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |