Close popover

Table of Contents

Identifying the operator for Kerberos authentication services

Version:

Specify the operator mapping so that a Kerberos authentication service can find the requestor record in your repository and bring values back to Pega Platform.

  1. Open the service from the navigation panel in Dev Studio by clicking Records SysAdmin Authentication Service and choosing a service from the instance list, and then navigate to the Kerberos tab.

  2. If you are using LDAP, in the User principal name attribute field, enter the LDAP attribute name that is used for the User Principal Name on the LDAP server.

  3. On the Mapping tab, map the naming attributes in the directory sever that correspond to the operator ID properties.

    1. Click the Add item icon, and add four attribute mapping rows.

    2. In the Property Name field, enter one of the following properties: .pyUserName, .pyOrganization, .pyOrgDivision, and .pyOrgUnit.

    3. In the Attribute Name field, enter the LDAP attribute that relates to the entered operator property.

  4. On the Custom tab, in the Source of operator credentials list, select where the operator credentials are stored.

    • Use credentials stored in PegaRULES – Only the users whose operator ID records do not have Use external authentication selected are allowed access through this service.
    • Use externally stored credentials – Only the users whose operator ID records have Use external authentication selected are allowed access through this service.
  5. Click Save.

  • Authentication services

    To override or extend the default authentication process, create and configure an authentication service.

  • More about authentication services

    This page describes additional topics relevant to authentication services that are not directly referenced on the rule form.

  • Creating an authentication service

    To override or extend the default authentication process, create an authentication service. By creating an authentication service, you implement more specialized authentication requirements than the default, for example, to use pre-authentication and post-authentication activities.

Suggest Edit

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.