Table 33: Configuring File Rewriting Resource Policies Details
(continued)
Your Action
Function
Option
Select one of the following
options from the drop-down
list:
•
Use Specified
Credentials(Variable
Password)...
—Secure
Access device uses
specified credentials with
variable password to pass
to the Windows share or
directory
•
Use Specified
Credentials(Fixed
Password)...
—Secure
Access device uses
specified credentials with
fixed password to pass to
the Windows share or
directory.
•
Prompt for user
credentials
—Secure Access
device intermediates the
share challenge by
presenting an
authentication challenge in
the Secure Access device
the first time a user
attempts to access the
share.
•
Detailed Rules
—Specifies
one or more detailed rules
for this policy.
Specifies the action to take
when a resource requires
credentials.
Action
Enter a variable. For example
enter <USERNAME> or a static
username. For example,
administrator
to submit to the
Windows share or directory.
NOTE: When entering a
variable, you may also include
a domain. For example enter
yourcompany.net\<USERNAME>
Specifies a username to
submit to the Windows share
or directory.
NOTE: This box is enabled
only when you select the
Use
Specified
Credentials(Variable
Password)...
or
Use Specified
Credential(Fixed Password)...
options from the Action
drop-down list.
Username
Enter the variable password.
Specifies a variable password
to Windows share or directory.
NOTE: This box is enabled
only when you select the
Use
Specified
Credentials(Variable
Password)...
option from the
Action drop-down list.
Variable Password
Copyright © 2010, Juniper Networks, Inc.
140
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...