beautypg.com

Google Search Appliance Managing Search for Controlled-Access Content User Manual

Page 46

background image

Google Search Appliance: Managing Search for Controlled-Access Content

46

To import and update policy ACLs:

1.

Import the policy ACLs from the earlier release as described in “Importing a Configuration File.”

2.

For each imported policy ACL, click the Edit link under Matching URL Patterns.

Observe that Principal Name and Principal Type are imported correctly and that default values
are added for the Domain, Namespace/Credential Group, and Case Sensitive?.

3.

Update Domain, Namespace/Credential Group, and Case Sensitive? as appropriate for the
policy ACL.

4.

Click Save.

Searching Policy ACLs

You can perform the following types of searches from the Policy pattern field on the Serving > Policy
ACLs
page:

All Rules or Exact-match Rules or Coarse-grained Rules

Display rules by their type—view all rules by the filter you choose, or only those that contain text
that you specify in the Policy pattern field. Click Search to list the rules, rules display in alphabetic
order by the rule name. The rule filters are as follows:

All Rules—List all rules or those that contain the text you specify in the Policy pattern field.

Exact-match Rules—List all exact-match rules or those exact-match rules that contain the text
you specify in the Policy pattern field.

Coarse-grained Rules—List all coarse-grained rules or those coarse-grained rules that contain
the text you specify in the Policy pattern field.

Find Rules for URL

Provide a URL and all the rules that match the URL are displayed. This search tells you which
patterns match a URL. This helps you know for a given URL, which rule applies. Enter a URL pattern
in the Policy pattern field, choose Find Rules for URL, and clicking Search. The rules are displayed
in best match order. The first rule that displays applies, and is the best match and is the rule that
the search appliance applies. The first rule is the one and only rule that is applied. This best match
order is useful when you have two rules that match a URL and you want to find which rule applies
best to the URL.

Search results appear under Matching URL Patterns.

Exporting Search Results

After you search policy ACLs, you can export the search results as an XML file. To export search results,
click Export Search Results. The exported file is in the same format as an import configuration file.

The default file name is policy_acl.xml.

Using Credential Groups with Policy ACLs

Policy ACLs require that the identity of a user has been verified by an authentication method. A
credential group can be used to authenticate a user’s identity for a policy ACL. However, although you
can configure multiple credential groups for a system, the search appliance only currently supports one
verified identity (see “Primary Verified Identity” on page 17) from all the credential groups for policy
ACLs. Generally, the Default credential group (see “About the Default Credential Group” on page 19)
provides the primary verified identity for use with a policy ACL.

To use a credential group with a policy ACL: