Chapter 10. Configuring certificate mapping rules in Identity Management