7.0

Table Of Contents
Each rule in the default access policy requires that a set of criteria be met in order to allow user access to
the apps portal. You apply a network range, select which type of user can access content and select the
authentication methods to use. See Managing Access Policies.
The number of attempts the service makes to login a user using a given authentication method varies.
The services only makes one attempt at authentication for Kerberos or certificate authentication. If the
attempt is not successful in logging in a user, the next authentication method in the rule is attempted. The
maximum number of failed login attempts for Active Directory password and RSA SecurID authentication
is set to five by default. When a user has five failed login attempts, the service attempts to log in the user
with the next authentication method on the list. When all authentication methods are exhausted, the
service issues an error message.
Apply Authentication Methods to Policy Rules
Only the password authentication method is configured in the default policy rules. You must edit the policy
rules to select the other authentication methods you configured and set the order in which the
authentication methods are used for authentication.
Prerequisites
Enable and configure the authentication methods that your organization supports. See Integrating
Alternative User Authentication Products with Directories Management
Procedure
1 Select Administration > Directories Management > Policies
2 Click the default access policy to edit.
3 To edit a policy rule, click the authentication method to edit in the Policy Rules, Authentication Method
column.
The add a new policy rule, click the + icon.
4 If adding a new rule, select the network range for this policy and the device type that the rule
manages.
5 To configure the authentication order, in the then the user must authenticate using the following
method drop-down menu, select the authentication method to apply first. To require users to
authenticate through two authentication methods, in the next drop down menu, select and and enter
a second authentication method.
Note All the authentication methods are listed in the drop-down menu, even if they are not enabled.
Select only from the authentication methods that are enabled on the Connector > Auth Adapters
page.
6 (Optional) To configure a fallback authentication method if the first authentication fails, select another
enabled authentication method from the next drop-down menu.
You can add multiple fallback authentication methods to a rule.
7 Click Save and click Save again on the Policy page.
Configuring vRealize Automation
VMware, Inc. 122