Assign a security profile to the selected application. The security profile defines parameters for how the
server authenticates the user during onboarding, and request-response
interactions.
Prerequisites
Note: You must configure security profiles for application authentication before you can
complete this step.
Task
Security profiles
are comprised of one or more authentication providers. These authentication providers
can be shared across multiple security profiles, and can be modified in
Management Cockpit. You can stack multiple providers to take
advantage of features in the order you chose; the Control Flag must be set for each
enabled security provider in the stack.
- From Management Cockpit, select .
- Click Existing Profile.
Note: You can
also
create
a new
profile.
- In Name, select a security profile name from the list. The name appears under
Security Profile Properties, and one or more security providers appear under
Authentication Providers.
- Under Security Profile Properties, enter
values.
Field |
Value |
Name |
A unique name for the application authentication profile. |
Check Impersonation |
(Optional) In token-based authentication, whether to allow authentication to succeed
when the user name presented cannot be matched against any of the
user names validated in the login modules. To prevent the user
authentication from succeeding in this scenario, the property is
enabled by default. |
- Under Authentication Providers, you can select a security profile URL to view its
settings. To change its settings, you must modify it through .