Allowing Other Portals to Search Your Portal
An incoming
federated search allows other AquaLogic Interaction portals to search
your portal.
Before you create an incoming federated search, you must:
- Agree upon a portal identification name and password with the
administrator of the requesting portal.
- If the users from the requesting portal do not exist in your portal,
create one or more portal users that can be impersonated by users
of the requesting portal.
To create an outgoing federated search you must have the following
rights and privileges:
- Access Administration activity right
- Create Federated Searches activity right
- At least Edit access to the parent folder (the folder that will
store the federated search)
- If the users from the requesting portal do not exist in your portal,
at least Select access to the authentication sources or groups that
include the impersonated users
- Click Administration.
- Open the folder in which you want to store the federated
search.
- In the Create Object drop-down list,
click Federated Search - Incoming.
- In the Portal identification name box, type the agreed upon name.
- In the Portal identification password box, type the agreed upon password.
- In the Password confirmation box,
type the password again.
- In the Served links are valid for box, type the minimum number of minutes or which these results should
be cached.
After a requesting portal issues a search of your portal, the
links returned by the search are stored for at least as long as you
specify here. After this period has elapsed, the user on the requesting
portal might need to re-issue the search.
- To allow unauthenticated users to search the portal as
a guest, click the Allow unauthenticated users to search
as the Guest user box.
- If the users from the requesting portal do not exist in
your portal, select the authentication sources or groups that include
the impersonated users.
Incoming search requests include the name of a local portal
user (that is, a user from the serving portal) to impersonate during
the search. The request is honored only if the impersonated user is
a member of one of the authentication sources or one of the groups
you specify.
- To add an authentication source, click Add Authentication Source, in the Choose
Authentication Sources dialog box, select an authentication source,
and click OK.
- To add a group, click Add Group, in the Choose Groups dialog box, select a group, and click OK.
To delete an authentication source or a group, select it
and click .
To select
or clear all of the authentication source or group boxes, select or
clear the box to the left of Authentication Sources or Groups.
- To toggle the order in which the authentication sources or
groups are sorted, click Authentication Sources or Groups.