Identity Injection policies, like all policies, are available to any proxy service on the LAG. As a general rule, a policy is created for each application, but this does not mean a policy cannot be used for multiple applications. Bear this in mind when creating and/or naming a policy.
Before you can create an Identity injection policy you will need to acquire the types of information used by the application and how the application processes this information. Use the Identity Injection process diagram as a guide to help you create the policy.
There are two key benefits to using an Identity Injection policy:
An Identity Injection policy creates a seamless link between the LAG and the proxied application. With an Identity injection policy, the LAG *is* the login page and the Identity Data Store for the application. In most instances, the user need only to successfully authenticate to the LAG; Once authenticated, the LAG can forward any information required by the application on behalf of the user. Credentials such as any LDAP attribute or X509 certificate or a SAML assertion can be used. This creates a secure access point for the application due to the fact the user is unaware of what is required for proper application access.!! More Information There might be more information for this subject on one of the following: