Secure Mobile Access 100 10.2 Administration Guide

Verifying the Access Policy Configuration

At this point:

  • Acme_Group users can access SSH to 10.200.1.102
  • Mega_Group users can access OWA at 10.200.1.10
  • IT_Groups users can access both SSH and OWA as defined previously

The configuration can be verified by logging in as different AD group members to the SNWL_AD domain on the SMA appliance and attempting to access the resources.

Test Result: Try Acmeuser Access

Acmeuser logs into the SNWL_AD domain.

The Users > Status page shows that acmeuser is a member of the local group, Acme_Group.

Acmeuser can access SSH, as expected.

Acmeuser tries to access to other resources like OWA 10.200.1.10, but is denied, as expected.

Test Result: Try Megauser Access

Megauser logs into the SNWL_AD domain.

The Users > Status page shows that megauser is a member of the local group, Mega_Group.

Megauser can access OWA resources, as expected.

Megauser tries to access SSH, but is denied, as expected.

Test Result: Try Ituser Access

Ituser logs into the SNWL_AD domain. The Users > Status page shows that ituser is a member of the local group, IT_Group.

Ituser can access SSH to 10.200.1.102, as expected.

Ituser can access OWA resources, as expected.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden