![]() |
|
Admin Console Help
Home |
Search > Secure Search >Trusted ApplicationsUse the Search > Secure Search >Trusted Applications page to perform the following tasks:
About Trusted ApplicationsA trusted application is one that gets requests from a user's browser and sends the end user's search requests to the search appliance. By registering a trusted application on this page, you can enable the search appliance to receive pre-validated ids from the trusted application. After a trusted application is registered, it can securely interact with the search appliance. Before sending a search request, the trusted application verifies the user. It only sends a search request after it successfully verifies the user. When the trusted application sends a search request, it sends information about the end user's identity. With early binding authorization (security permissions are stored on the search appliance), the trusted application only needs to send the end user's ID in addition to self credentials. The search appliance only needs to authenticate the application. The end user is verified automatically. With late binding (security permissions are checked with content sources at serve time), the trusted application needs to send the end user's credentials, in addition to self credentials. The search appliance needs to authenticate both the application and the end user. To register a trusted application with the search appliance, provide the information in the following table.
Take note that the trusted applications feature only supports basic authentication and cookie authentication. Before Starting this TaskBefore registering a trusted application, complete the tasks shown in the following table.
Enabling Trusted ApplicationsTrusted applications is disabled by default. To enable it, click Enable Trusted Applications. To disable it, clear the checkbox. Adding Trusted Users or GroupsTo add a trusted user or group:
Editing Trusted Users or GroupsTo edit a trusted user or group:
Deleting Trusted Users or GroupsTo delete a trusted user or group, click the trash icon in the row that you want to delete. Selecting the Credential Group for the Authentication MechanismTo select the credential group for the authentication mechanism:
For More InformationFor more information about trusted applications, see "Managing Search for Controlled-Access Content," which is linked to the Google Search Appliance help center. |
||||||||||||||||||||
© Google Inc. |