Pattern matching syntax
Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
Pattern matching syntax
Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; and Windows Server 2003, Datacenter Edition support regular expressions for pattern matching, which is widely used in UNIX environments. You can use this syntax to specify the conditions of remote access policy attributes and RADIUS realms, as specified in the following table.
Character | Description | Example |
---|---|---|
\ |
Marks the next character as a character to match. |
/n/ matches the character "n". The sequence /\n/ matches a line feed or newline character. |
^ |
Matches the beginning of the input or line. |
|
$ |
Matches the end of the input or line. |
|
* |
Matches the preceding character zero or more times. |
/zo*/ matches either "z" or "zoo." |
+ |
Matches the preceding character one or more times. |
/zo+/ matches "zoo" but not "z." |
? |
Matches the preceding character zero or one times. |
/a?ve?/ matches the "ve" in "never." |
. |
Matches any single character except a newline character. |
|
(pattern) |
Matches pattern and remembers the match. To match ( ) (parentheses), use "\(" or "\)". |
|
x|y |
Matches either x or y. |
/z|food?/ matches "zoo" or "food." |
{n} |
Matches exactly n times (n is a nonnegative integer). |
/o{2}/ does not match the "o" in "Bob," but matches the first two instances of the letter o in "foooood." |
{n,} |
Matches at least n times (n is a nonnegative integer). |
/o{2,}/ does not match the "o" in "Bob" but matches all of the instances of the letter o in "foooood." /o{1,}/ is equivalent to /o+/. |
{n,m} |
Matches at least n and at most m times (m and n are nonnegative integers). |
/o{1,3}/ matches the first three instances of the letter o in "fooooood." |
[xyz] |
Matches any one of the enclosed characters (a character set). |
/[abc]/ matches the "a" in "plain." |
[^xyz] |
Matches any characters that are not enclosed (a negative character set). |
/[^abc]/ matches the "p" in "plain." |
\b |
Matches a word boundary (for example, a space). |
/ea*r\b/ matches the "er" in "never early." |
\B |
Matches a nonword boundary. |
/ea*r\B/ matches the "ear" in "never early." |
\d |
Matches a digit character (equivalent to [0-9]). |
|
\D |
Matches a nondigit character (equivalent to [^0-9]). |
|
\f |
Matches a form feed character. |
|
\n |
Matches a line feed character. |
|
\r |
Matches a carriage return character. |
|
\s |
Matches any white space character including space, tab, and form feed (equivalent to [ \f\n\r\t\v]). |
|
\S |
Matches any non-white space character (equivalent to [^ \f\n\r\t\v]). |
|
\t |
Matches a tab character. |
|
\v |
Matches a vertical tab character. |
|
\w |
Matches any word character, including underscore (equivalent to [A-Za-z0-9_]). |
|
\W |
Matches any nonword character, excluding underscore (equivalent to [^A-Za-z0-9_]). |
|
\num |
Refers to remembered matches (?num, where num is a positive integer). For example, \1 replaces what is stored in the first remembered match. This option can be used only in the Replace text box when configuring attribute manipulation. |
|
/n/ |
Allows the insertion of ASCII codes into regular expressions (?n, where n is an octal, hexadecimal, or decimal escape value). |
|
Examples for remote access policy attributes
The following examples describe the use of the pattern matching syntax to specify remote access policy attributes:
To specify all phone numbers within the 899 area code, the syntax is:
899.*
To specify a range of all IP addresses that begin with 192.168.1, the syntax is:
192\.168\.1\..+
Examples for manipulation of the realm name in the User-Name attribute
The following examples describe the use of the pattern matching syntax to manipulate realm names for the User-Name attribute, which is located on the Attribute tab in the properties of a connection request policy. For more information, see Configure attribute manipulation.
To remove the realm portion of the User-Name attribute
In the outsourced dial scenario, the Internet service provider (ISP) might require a realm name to route the authentication request. However, the IAS server might not recognize the realm name portion of the user name. Therefore, the realm name must be removed before it is forwarded to the IAS server.
Find: @microsoft\\.com
Replace:
To replace user@example.microsoft.com with example.microsoft.com\user
Find: (.*)@(.*)
Replace: $2\$1
To replace domain\user with specific_domain\user
Find: (.*)\\(.*)
Replace: specific_domain\$2
To replace user with user@specific_domain
Find: $
Replace: @specific_domain
Example for RADIUS message forwarding by a proxy server
You can create routing rules that forward RADIUS messages with a specific realm name to a specific set of RADIUS servers when IAS is used as a RADIUS proxy. Following is a recommended syntax for routing requests based on realm name.
NetBIOS name | Pattern |
---|---|
WCOAST |
^wcoast\\ |
In the following example, wcoast.microsoft.com is a unique user principal name (UPN) suffix for the DNS or Active Directory domain wcoast.microsoft.com. Using the supplied pattern, the IAS proxy can route messages based on domain NetBIOS name or UPN suffix.
NetBIOS name | UPN suffix | Pattern |
---|---|---|
WCOAST |
wcoast.microsoft.com |
^wcoast\\|@wcoast\.microsoft\.com$ |
Ping user-name
Some RADIUS proxy servers and network access servers periodically send authentication and accounting requests (known as ping requests) to verify that the IAS server is present on the network. These ping requests include fictional user names. When IAS processes these requests, the event and accounting logs become filled with access reject records, making it more difficult to keep track of valid records.
When you configure a registry entry for ping user-name, IAS matches the registry entry value against the user name value in ping requests by other servers. A ping user-name registry entry specifies the fictional user name (or a user name pattern, with variables, that matches the fictional user name) sent by RADIUS proxy servers and network access servers. When IAS receives ping requests that match the ping user-name registry entry value, IAS rejects the authentication requests without processing the request. IAS does not record transactions involving the fictional user name in any log files, which makes the event log easier to interpret.
Note
- Ping user-name is not installed by default. You must add ping user-name to the registry. You can add an entry to the registry using Registry Editor. For more information, see Registry Editor.
Caution
- Incorrectly editing the registry may severely damage your system. Before making changes to the registry, you should back up any valued data on the computer.
Adding ping user-name to the registry
Ping user-name can be added to the following registry key as a string value by a member of the local Administrators group:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\IAS\Parameters
Name | Type | Data |
---|---|---|
ping user-name |
REG_SZ |
User name |
Note
- To indicate more than one user name for a ping user-name value, enter a name pattern, such as a Domain Name System (DNS) name including wildcard characters, in Data.