Table 44: Secure Access eTrust SiteMinder Configuration
Details
(continued)
Your Action
Function
Option
Select
Siteminder Settings >
Authentication >
Authentication Type >
Custom Agent
option from the
Authentication Type
drop-down list.
Authenticates using the
Secure Access device custom
Web agent.
Authentication Type > Custom
Agent
Select
Siteminder Settings >
Authentication >
Authentication Type > Form
POST
option from the
Authentication Type
drop-down list to allow the
Web agent to contact the
policy server to determine the
appropriate sign-in page to
display to the user.
Posts user credentials to a
standard Web agent that you
have already configured rather
than contacting the SiteMinder
policy server directly.
Authentication Type > Form
POST
Enter the target URL.
Specifies the target URL.
NOTE: The form post target,
form post protocol, form post
Webagent, form post port,
form post path, and form post
parameters field are displayed
only when you select
Form
POST
option from the
Authentication type
drop
down list.
Form POST Target
Select the protocol from the
drop-down list:
•
HTTP
—For non secure
communication.
•
HTTPS
—For secure
communication.
Allows you to specify the
protocol for communication
between IVE and the specified
Web agent.
NOTE: This field is displayed
only when you select the
Form
POST
option from the
Authentication Type
drop-down list.
Form POST Protocol
Enter the name of the web
agent.
Specifies the name of the Web
agent from which the Secure
Access device is to obtain
SMSESSION cookies.
NOTE: This field is displayed
only when you select
Form
POST
option from the
Authentication Type
drop-down list.
Form POST Webagent
Copyright © 2010, Juniper Networks, Inc.
178
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...