Use Cases | 383Adding the OWA PERMIT PoliciesIn this section, we will add two OWA PERMIT policies for both Mega_Group and IT_Group toaccess the OWA service using Secure Web (HTTPS).This procedure creates a policy for the SRA Local Group, Mega_Group, and results in OWAaccess for members of the Active Directory group, Mega Group.To access the Exchange server, adding a PERMIT policy to the 10.200.1.10/exchange URLObject itself is not enough. Another URL Object policy is needed that permits access to10.200.1.10/exchweb, because some OWA Web contents are located in the exchwebdirectory.Repeat this procedure for IT_Group to provide OWA access for members of the ActiveDirectory group, IT Group.Note In this configuration, members of IT_Group and Mega_Group are denied access tothe https://owa-server/public folder, because these groups have access only to the/exchange and /exchweb subfolders.The OWA policies are applied to Exchange server URL Objects rather than server IP addressessince OWA is a Web service.Step 1 In the Users > Local Groups page, click the Configure button in the Mega_Group row. Wewill create two PERMIT policies for Mega_Group to allow access to the OWA Exchange server.Step 2 In the Edit Group Settings window, click the Policies tab, and then click Add Policy.Step 3 In the Add Policy window, select URL Object in the Apply Policy To drop-down list.Step 4 In the Policy Name field, enter the descriptive name, OWA.Step 5 In the Service drop-down list, select Secure Web (HTTPS).Step 6 In the URL field, enter the URL of the target application, 10.200.1.10/exchange.Step 7 In the Status drop-down list, select PERMIT, and then click Add.Step 8 In the Edit Group Settings window on the Policies tab, click Add Policy.