Secure Mobile Access 12.4 Deployment Guide

Putting It All Together: Using Realms and Communities

Realms are the top-level objects that tie together authentication, user management, access agent provisioning, and End Point Control restrictions.

A realm references one authentication server or a pair of them (for chained authentication). Authentication servers must first be defined in AMC, and they are then referenced by a realm that users log in to.

After users log in to the appliance, they are assigned to a community based on the identity supplied during login. By default, all users are assigned to a default community, but you can sort users into different groups based on individual identity or group memberships. In turn, the community defines a default set of access methods and the set of end point restrictions placed on client devices. The community can also determine the appearance of WorkPlace: the layout and style of WorkPlace pages can be tailored to a particular community.

The below image shows how a realm authenticates users, assigns them to communities to provision access agents and, with End Point Control enabled, assigns community members to different zones based on the trustworthiness of their computers.

If your network uses a single authentication server to store user information, you’ll probably need to create only one realm in AMC. That realm could then reference the global community that is configured by default in AMC. This would be useful if you have a homogenous user population with identical access requirements.

Using only one realm doesn’t limit your ability to configure more granular levels of user access and End Point Control. AMC allows you to create communities of users within a realm based on their access needs or other security considerations. A community can consist of all the users in a realm, or only selected users or groups.

For example, you might have two distinct groups of users—employees and business partners—requiring different forms of VPN access. The below tables contrast the access agents that are made available to these two groups, and how EPC is used to secure their connections. By creating different WorkPlace styles and layouts you also can determine how WorkPlace looks to members of these two communities.

Employee community
Access Agent EPC
A tunnel client, enabling them to access Web, network, and file share resources. EPC is used to detect whether employees’ computers are running an antivirus program and firewall before placing them in a trusted zone.
Users connect from trusted computing environments (such as laptops provided by your IT department) and require broad access to your network resources.
Business partner community
Access Agent EPC
Limited, Web-only access Business partners are assigned to a less-trusted zone.
Partners connect through unsecured computing environments and require access only to specific, limited resources.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden