After configuring HCL Digital Experience to use Security Access Manager for externalized
authorization, you should verify that it works properly before continuing with any additional
configuration tasks.
About this task
Perform
the following steps to verify that Security Access Manager is working properly:
Procedure
-
Verify that your topology matches the topology described in the protected object space.
For example, ensure the value of the wp.ac.impl.PDroot
parameter exists in the Security Access Manager protected object
space.
-
Perform the following steps to verify that at least one user, typically the administrator, has
the
Administrator@VIRTUAL/EXTERNAL ACCESS CONTROL_1
role:
-
Enter the pdadmin> acl show
WPS_Administrator-VIRTUAL_wps-EXTERNAL_ACCESS_CONTROL_1 command on the pdadmin command
line to verify that the administrator and administrator group have the
Administrator@VIRTUAL/EXTERNAL ACCESS CONTROL_1
role.
- Optional:
Enter the following commands to add the administrator to the
Administrator@VIRTUAL/EXTERNAL ACCESS CONTROL_1
role if no entry is found:
- pdadmin> acl modify WPS_Administrator-VIRTUAL_wps-EXTERNAL_ACCESS_CONTROL_1 set user
wpsadmin T[WPS]m
- pdadmin> acl modify WPS_Administrator-VIRTUAL_wps-EXTERNAL_ACCESS_CONTROL_1 set
group wpsadmins T[WPS]m
where wpsadmin is the administrator user ID and
wpsadmins is the administrator group.
-
Perform the following steps from the Resource Permissions
portlet:
- Select a resource type.
- Click the Assign Access icon
for the specific resource.
- Click the Edit Role icon for
a role that you want to externalize.
- Click Add to explicitly assign
at least one user or group to your chosen role for the resource.
- Click Search for Users or User
Groups or
click the pull down for the Search by option
where the default is set to All available to
select specific users or user groups. Then click OK.
An informational message box should display the
message
that members were successfully added to the role.
- Optional: Explicitly assign additional roles.
If you do not assign at least one user or group to each role type
for the resource, you must use the external security manager interface
to create this role type later. For example, if you do not assign
any users or groups to the Editor role type for the resource, then
you must use the external security manager interface to create the
Editor role type later.
- Click the Externalize icon for
the resource. These steps move every role that is defined for each
resource you assigned to the Security Access Manager protected object
space. One ACL is created for each externalized role.
- Add users to the ACLs that are attached
to the role types
on that resource by using either the Security Access Manager GUI or the pdadmin
command line.
Remember: If you log on as an
administrator to externalize resources to
Security Access Manager,
- You must be a member of the
wpsadmins
group. - The
wpsadmins
group must appear in the VIRTUAL/EXTERNAL_ACCESS_CONTROL_1
ACL.