4.
In the
Integrated authentication turned on
drop-down list, click
Yes
.
5.
For each Microsoft Active Directory account, provide the following information:
• In the
Delegation user domain
field, type the FQDN (for example,
ldap.example.com
).
• In the
Delegation user name
field, type the user name.
• In the
Password
and
Confirm
fields, type the password.
6.
Click
Save all
.
7.
On the
HTTP
tab, click
Edit component
.
8.
In the
Authentication support enabled
drop-down list, click
Yes
.
9.
Click
Save all
.
10. On the
Pull URL Patterns
tab, specify web address patterns for the intranet sites or shared folders that you want to
permit BlackBerry device users to access (for example,
intranet_site(:80)?(\/.*)?
). The web address patterns are
based on Java regular expressions. Consider specifying the following web address patterns:
• Specify
.*\:.*\/.*
as the web address pattern so that you can prevent users from using any other web address
patterns to access intranet sites or shared network folders.
• Specify
.*
as the web address pattern for OCSP, LDAP, and TCP to permit users to communicate with OCSP
servers, LDAP servers, or TCP servers.
11. On the
Access control rules
tab, create a pull rule for each of the web address patterns that you specified. When you
create the pull rule, in the
Authentication
drop-down list, click
Integrated
or
Integrated and RSA
.
12. Click
Save all
.
13. Assign the pull rules to the users or groups that you want to access intranet sites or shared network folders.
14. On the
Servers and components
menu, expand
BlackBerry solution topology > BlackBerry Domain > Component
view > MDS Connection Service
.
15. Click a BlackBerry MDS Connection Service instance.
16. Click
Edit instance
.
17. In the
Pull Authorization
drop-down list, click
Yes
.
18. Click
Save all
.
19. Repeat step 16 to 20 for each BlackBerry MDS Connection Service instance.
Related information
Specify web address patterns,
309
Create a pull rule,
309
Assign a pull rule to the members of a group,
311
Assign a pull rule to user accounts,
311
Restrict or permit web addresses and Intranet addresses using a pull rule,
310
Administration Guide
Managing how users access enterprise applications and web content
319