Table 44: Secure Access eTrust SiteMinder Configuration
Details
(continued)
Your Action
Function
Option
Enter a name.
Specifies the name of the user
attribute cookie in the
SiteMinder user directory.
Name
Table 45: Secure Access eTrust SiteMinder Advanced Configuration
Details
Your Action
Function
Option
Siteminder Settings > Advanced tab
Enter the poll interval in
seconds.
Specifies the interval at which
Secure Access device polls the
SiteMinder policy server to
check for a new key.
Poll Interval (seconds)
Enter a number.
Controls the maximum
number of simultaneous
connections that the Secure
Access device is allowed to
make to the policy server.
NOTE: The default setting is
20.
Maximum Agents
Enter a number.
Controls the maximum
number of requests that the
policy server connection
handles before the Secure
Access device ends the
connection. If necessary, tune
to increase performance.
NOTE: The default setting is
1000.
Maximum Requests/Agent
Enter the Idle timeout in
minutes.
Controls the maximum
number of minutes a
connection to the policy server
may remain idle (the
connection is not handling
requests) before the Secure
Access device ends the
connection. The default
setting of “none” indicates no
time limit.
Idle Timeout (minutes)
Select
Siteminder Settings >
Advanced > Authorize while
Authenticating
.
Specifies that the Secure
Access device should look up
user attributes on the policy
server immediately after
authentication to determine if
the user is truly authenticated.
Authorize while Authenticating
Copyright © 2010, Juniper Networks, Inc.
182
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...