Considerations

The following considerations apply when you configure the N5 Authorization:

  • The STG names that are configured in the N5AuthorizationSTGConfiguration should be unique.

  • The IE names for the output columns that are configured in the N5AuthorizationSTGConfiguration service should be unique.

  • The chained evaluation keys should have the same IE name for the output column in the source table, and the input column in the destination table.

  • The result of the N5AuthorizationSTGConfiguration service is available in the last table that is defined in the list. The table includes the output columns with the following mandatory IE names: Bearer-Authorization and Error-Message.

  • The Bearer-Authorization column can be configured to accept the fixed values that are Accept and Reject.

  • Perform the configurations that are required for defining and mapping the CRD tables as per the requirement.

  • The Policy Server evaluates the mapped source output IEs (result column of the STG) through the CRD which it has created. If PCF has not created the CRD, then it cannot query the corresponding chained input key which further limits it from verifying the N5 Authorization.

  • 1:1 mapping must exist between a chained pair of output IE and the input key.