Skip to main content

Rules Possible Configuration Scenarios

The following table outlines all valid authentication configurations available in Rules, covering the nine supported combinations of Inbound Authentication Method, Inbound Authentication Source, and Outbound Credential Source.

info

While the USP Admin UI does not enforce this restriction immediately, you cannot configure a Rule with Inbound Authentication Source set to None (i.e., Authentication at the Proxy toggle disabled) and Outbound Credential Source set to Dedicated Credentials. This combination is not allowed and will prevent the Rule from being added.

Option #Inbound Authentication MethodInbound Authentication SourceOutbound Credential Source
1PasswordNonePassthrough
2PasswordAccount RepositoryPassthrough
3PasswordAccount RepositoryDedicated Credentials
4PasswordLDAPPassthrough
5PasswordLDAPDedicated Credentials
6Password and Public KeyAccount RepositoryDedicated Credentials
7Password and Public KeyAccount RepositoryPassthrough
8Password or Public KeyAccount RepositoryDedicated Credentials
9Public KeyAccount RepositoryDedicated Credentials
info

Configuration #1 is the one selected in the Configuration Tutorial guide.