Table 19: User Role Web Rewriting Configuration Details
(continued)
Your Action
Function
Option
Enter the URL.
Specifies the URL to
bookmark.
NOTE: This box is displayed
only when you select
Standard
from the Bookmark
Type drop-down list.
URL
Enter the unique HTML page
definition.
Specify an HTML page
definition that includes
references to your Java
applets.
NOTE: Enter a unique HTML
page definition in this box. If
you create two bookmarks
with the same HTML code, the
Secure Access device deletes
one of the bookmarks in the
end-user view. You can still
see both bookmarks, however,
in the administrator console.
NOTE: The Applet HTML and
Multi-Valued User Attributes
fields are displayed only when
you select
Applet
from the
Bookmark Type drop-down
list.
Applet HTML
Enter multiple attributes.
Allows you to specify multiple
attributes if your HTML code
contains attributes that may
expand to multiple values
(such as
userAttr.hostname
or
userAttr.ports
), .
Multi-Valued User Attributes
Web > Options tab
Select the
User can type URLs
in Secure Access device
browse bar
check box to
enable this feature.
Enables users to enter URLs
on the welcome page.
User can type URLs in IVE
browse bar
Select the
User can add
bookmarks
check box to
enable this feature.
Enables users to create
personal Web bookmarks on
the Secure Access device
welcome page.
Users can add bookmarks
Copyright © 2010, Juniper Networks, Inc.
86
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...