Manage ESM User Mappings

The Manage ESM User Mappings task shows whether your cluster is being remotely managed by the esm (ESM). Use this task to:
gateway91
The
Manage ESM User Mappings
task shows whether your
API Gateway
cluster is being remotely managed by the
Enterprise Service Manager
(ESM). Use this task to:
  • View identification information about the Gateway and break the link if necessary.
  • See which Gateway user has been mapped to an ESM user and remove the mapping if necessary.
The Managing ESM User Mappings assertion is available only when your Gateway is remotely managed by the Enterprise Service Manager.
You cannot initiate a link between your Gateway cluster and an ESM using Manage ESM User Mappings. To do this you must enable Remote Node Management from within the Gateway and then add the cluster in the ESM. For details, see Configure the Enterprise Service Manager.
To manage ESM user mappings
:
  1. In the Policy Manager, select
    [Tasks] > Users and Authentication > Manage ESM User Mappings
    from the Main Menu (on the browser client, from the Manage menu).
    The Manage ESM User Mappings dialog appears.
  2. The upper list shows which ESM has been trusted to manage this Gateway cluster.
    • To sever the link between the Gateway cluster and the ESM system, select the ESM row from the list and then click [
      Remove Registration
      ]. Click [
      OK
      ] to acknowledge the confirmation. The ESM registration is removed.
      Removing the registration also removes all mapped users from that ESM system. These users will no longer be able to perform any task involving the Gateway cluster (such as monitoring system properties, migrating services/policies, or generating reports).
  3. The lower list shows which ESM user has been mapped to which Gateway user.
    • To remove a mapping between an ESM user and a Gateway user, select the appropriate row from the list and then click [
      Delete Mapping
      ]. Click [
      OK
      ] to acknowledge the confirmation. The ESM user is now considered untrusted and will have limited access to the Gateway cluster, regardless of his or her role within the ESM.
  4. Click [
    Close
    ] when done.