Este conteúdo não está disponível no idioma selecionado.

11.8.2. Configure Security Mapping in a Security Domain


To configure security mapping settings for a security domain, log into the management console and follow this procedure.

Procedure 11.12. Setup Security Mapping Settings in a Security Domain

  1. Open the security domain's detailed view.

    1. Click the Configuration label at the top of the management console.
    2. In a managed domain, select a profile from the Profile selection box at the top left.
    3. Expand the Security menu, and select Security Domains.
    4. Click View for the security domain you want to edit.
  2. Navigate to the Mapping subsystem configuration.

    Select the Mapping label at the top of the screen.
    The configuration area is divided into two areas: Modules and Details. The mapping module is the basic unit of configuration. A security domain can include several mapping modules, each of which can include several attributes and options.
  3. Add a security mapping module.

    Click Add.
    Fill in the details for your module. The Code is the class name of the module. The Type field refers to the type of mapping this module performs. Allowed values are principal, role, attribute or credential.
  4. Edit a security mapping module

    After you have added your module, you can modify its Code or Type.
    1. Select the Attributes tab.
    2. Click Edit in the Details section of the screen.
  5. Optional: Add, edit, or remove module options.

    To add options to your module, click its entry in the Modules list, and select the Module Options tab in the Details section of the page. Click Add, and provide the key and value for the option.
    To edit an option that already exists, click Remove to remove it, and add it again with the new value.
    Use the Remove button to remove an option.
Result

Your security mapping module is added to the security domain, and is immediately available to applications which use the security domain.

Red Hat logoGithubredditYoutubeTwitter

Aprender

Experimente, compre e venda

Comunidades

Sobre a documentação da Red Hat

Ajudamos os usuários da Red Hat a inovar e atingir seus objetivos com nossos produtos e serviços com conteúdo em que podem confiar. Explore nossas atualizações recentes.

Tornando o open source mais inclusivo

A Red Hat está comprometida em substituir a linguagem problemática em nosso código, documentação e propriedades da web. Para mais detalhes veja o Blog da Red Hat.

Sobre a Red Hat

Fornecemos soluções robustas que facilitam o trabalho das empresas em plataformas e ambientes, desde o data center principal até a borda da rede.

Theme

© 2026 Red Hat
Voltar ao topo