Chapter 4. Certificate mapping rules for configuring authentication