1. Introduction

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information that you need to inject to allow access to the resource.

If you would like to know more about NAM Identity Injection policy. Please use the following link:
https://www.netiq.com/documentation/access-manager-42/admin/data/b5547ku.html

NAM provides multiple options (LDAP attribute, Client IP, OAuth Claims etc.) to inject into the URL, custom header, Cookie header, etc.

2. Business Requirement / Use cases

NAM out of the box injection values are static and meet the requirements most of time. But if you need to inject dynamic values or need to perform some modification (like Capitalize of any LDAP attribute, extract CN value from DN format), NAM has given you the opportunity to use Virtual Attribute.

Please go through the following URL to learn about Virtual Attribute:
https://www.netiq.com/documentation/access-manager-43/admin/data/b1caobu1.html

3. Configure Virtual Attribute

 

3.1 Create Data Source

  1. Go to Identity Servers -> Shared Setting -> Data Source
  2. Click on + sign and create your data source

3.2 Create Attribute Source

  1. Go to Identity Servers -> Shared Setting -> Virtual Attributes -> Attribute Source and add an attribute source.
  2. Specify an attribute source Name, description of the attribute source and select Data Source Name.
    Provide input parameters: This the input parameter name (P1) and it should contain any value (like user id, employee id, global id etc.) which can be used to uniquely identify the user from the Data Source. In my example, I have given sAMAccountName as unique identifier.

Provide filter and output parameters: Specify an LDAP filter that must use the input details specified in the Provide input parameters section

Filter: sAMAccountName=%P1%
Filter Output Name: memberOf

19-1

3.3 Create Virtual Attribute and Test

    1. Go to Identity Servers -> Shared Setting -> Virtual Attributes -> Virtual Attribute and click on + sign to create a virtual attribute

19

  1. Provide input parameter P1: memberOf

My example will retrieve the CN value of user’s group and capitalize it.

Select a function: Advanced: Javascript
Script: Copy and paste following javascript

function main( P1 ){
return capitalizeGroupCN(P1);
}
function capitalizeGroupCN(attribute){
var result = [];
if(attribute instanceof Array){
var j =0;
for(var i=0; i<attribute.length; i++){
var group = getGroupCN(attribute[i]);
result[j++] = convertToUpperCase(group);
}
}
else{
var group = getGroupCN(attribute);
result[0] = convertToUpperCase(group);
}
return result;
}

function getGroupCN(group){
var startindex = 3;// it starts with cn
var endindex = group.indexOf(",");
return group.substring( startindex, endindex);
}

function convertToUpperCase (attribute){
var result ;
if(attribute instanceof Array){
result = [];
for(var i=0; i<attribute.length; i++)
result[i] = attribute[i].toUpperCase();
}else{
result = attribute.toUpperCase();
}
return result;
}

You can test your script by providing a few Test Values. Here is the example:

20

21

3.4 Create in Identity Injection Policy

Create Access Gateway Identity Injection policy and use Virtual Attribute as follows.

22

4. Test the Injection Policy

Assign the Identity Injection policy to your protected resource and look for the groupName header variable. You will find the user’s group name in upper case.

Please comment here if you have any questions or queries.

Get free email alerts on the topics of this article:

Identity & Access ManagementSecurity Management
Get Alerts!

Your subscription request was successful.

1 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 5 (1 votes, average: 5.00 out of 5)
You need to be a registered member to rate this post.
Loading...

Disclaimer: As with everything else at NetIQ Cool Solutions, this content is definitely not supported by NetIQ, so Customer Support will not be able to help you if it has any adverse effect on your environment.  It just worked for at least one person, and perhaps it will be useful for you too.  Be sure to test in a non-production environment.

Leave a Reply

No Comments
Koushik Halder
Sep 8, 2017
1:25 pm
Reads:
405
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow