Rules Possible Configuration Scenarios
The following table outlines all valid authentication configurations available in Rules, covering the nine supported combinations of Inbound Authentication Method, Inbound Authentication Source, and Outbound Credential Source.
info
While the USP Admin UI does not enforce this restriction immediately, you cannot configure a Rule with Inbound Authentication Source set to None (i.e., Authentication at the Proxy toggle disabled) and Outbound Credential Source set to Dedicated Credentials. This combination is not allowed and will prevent the Rule from being added.
| Option # | Inbound Authentication Method | Inbound Authentication Source | Outbound Credential Source |
|---|---|---|---|
| 1 | Password | None | Passthrough |
| 2 | Password | Account Repository | Passthrough |
| 3 | Password | Account Repository | Dedicated Credentials |
| 4 | Password | LDAP | Passthrough |
| 5 | Password | LDAP | Dedicated Credentials |
| 6 | Password and Public Key | Account Repository | Dedicated Credentials |
| 7 | Password and Public Key | Account Repository | Passthrough |
| 8 | Password or Public Key | Account Repository | Dedicated Credentials |
| 9 | Public Key | Account Repository | Dedicated Credentials |
info
Configuration #1 is the one selected in the Configuration Tutorial guide.