Reviewed-by: Hasko, Vladimir <vladimir.hasko@t-systems.com> Co-authored-by: Wei, Hongmin <weihongmin1@huawei.com> Co-committed-by: Wei, Hongmin <weihongmin1@huawei.com>
12 KiB
Step 2: Configure Identity Conversion Rules
As the enterprise administrator, you can manage identities and permissions of federated users in the enterprise identity provider. By configuring identity conversion rules, you can map the identities and permissions of federated users to the cloud system and control their access to specific resources.

- Modifications to identity conversion rules will take effect only after the federated users log in again.
- To modify the permissions of a federated user, modify the permissions of the user group to which the user belongs. Then restart the identity provider system for the modifications to take effect.
Prerequisites
An identity provider has been created in the cloud system, and the login link of the identity provider is accessible. (For details about how to create and verify an identity provider, see Step 1: Create an Identity Provider.)
Procedure
If you configure identity conversion rules by clicking Create Rule, IAM converts the rule parameters to the JSON format. Alternatively, you can click Edit Rule to configure rules in the JSON format.
- Creating a Rule
- Choose Identity Providers from the navigation pane.
- In the identity provider list, click Modify in the row containing the identity provider.
- In the Identity Conversion Rules area, click Create Rule. Then, configure the rule in the Create Rule dialog box.
Table 1 Parameter description Parameter
Description
Remarks
Username
Username of federated users to be displayed in the cloud system
To distinguish federated users from users of the cloud system, it is recommended that you set the username to "FederationUser-IdP_XXX". IdP indicates an identity provider name, for example, AD FS and Shibboleth. XXX indicates a custom name.
You can also set the federated username to a simple expression, for example, FederationUser-IdP_{email}. After the rule is created successfully, {email} is automatically replaced with the email address of each federated user. The rule takes effect only if a returned assertion contains an email address.
NOTICE:Each federated username must be unique under your account. Identical usernames under one or more identity providers of the same account will be identified as the same federated user in the cloud system.
User Group
User groups to which the federated users will belong in the cloud system
Federated users will inherit permissions from the groups to which they belong.
Rule Conditions
Conditions that a federated user must meet to obtain permissions from the selected user groups
Federated users who do not meet these conditions cannot access the cloud system. You can create a maximum of 10 conditions for an identity conversion rule.
NOTE:- An identity conversion rule can have multiple conditions. It takes effect only if all of the conditions are met.
- An identity provider can have multiple identity conversion rules. If a federated user does not meet any of the rules, the user will not be allowed to access the cloud system.
For example, set an identity conversion rule for enterprise administrators.
- Username: FederationUser-IdP_admin_{email}
- User group: admin
- Rule condition: _NAMEID_ (attribute), any_one_of (condition), and ID1;ID2;ID3 (value). Only users with ID1, ID2, or ID3 inherit permissions from the admin user group.
- In the Create Rule area, click OK.
- On the Modify Identity Provider page, click OK.
- Editing a Rule
- Log in to the cloud system as an administrator, and go to the IAM console. Then, choose Identity Providers from the navigation pane.
- In the identity provider list, click Modify in the row containing the identity provider.
- In the Identity Conversion Rules area, click Edit Rule. Then configure the rule in the Edit Rule dialog box.
- Edit the identity conversion rule in the JSON format. For details, see Syntax of Identity Conversion Rules.
- Click Validate to verify the syntax of the rule.
- If the rule is correct, click OK in the Edit Rule dialog box. Then click OK on the Modify Identity Provider page.
If a message indicating that the JSON file is incomplete is displayed, modify the statement or click Cancel to cancel the modifications.
Verifying Federated User Permissions
After configuring identity conversion rules, verify the permissions of federated users.
- Log in to the cloud system as a federated user, such as user ID1.
On the Identity Providers page of the IAM console, click View in the row containing the identity provider. Copy the login link displayed on the identity provider details page, open the link using a browser, and then enter the username and password.
- Check that the federated user has the permissions assigned to the user group to which the user belongs.
For example, an identity conversion rule has defined full permissions for all cloud services for federated user ID1 in the admin user group. On the management console, select any cloud service, and check if you can access the service.