Secure Mobile Access 100 10.2 Administration Guide

Verifying the Access Policy Configuration

At this point:

  • Acme_Group users can access SSH to 10.200.1.102
  • Mega_Group users can access OWA at 10.200.1.10
  • IT_Groups users can access both SSH and OWA as defined previously

The configuration can be verified by logging in as different AD group members to the SNWL_AD domain on the SMA appliance and attempting to access the resources.

Test Result: Try Acmeuser Access

Acmeuser logs into the SNWL_AD domain.

The Users > Status page shows that acmeuser is a member of the local group, Acme_Group.

Acmeuser can access SSH, as expected.

Acmeuser tries to access to other resources like OWA 10.200.1.10, but is denied, as expected.

Test Result: Try Megauser Access

Megauser logs into the SNWL_AD domain.

The Users > Status page shows that megauser is a member of the local group, Mega_Group.

Megauser can access OWA resources, as expected.

Megauser tries to access SSH, but is denied, as expected.

Test Result: Try Ituser Access

Ituser logs into the SNWL_AD domain. The Users > Status page shows that ituser is a member of the local group, IT_Group.

Ituser can access SSH to 10.200.1.102, as expected.

Ituser can access OWA resources, as expected.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.