Table 47: Secure Access Manual CA Certificate Configuration
Details
(continued)
Your Action
Function
Option
Select the check box.
NOTE: In client certificate authentication or
restriction, the device sends a list of all trusted
client CAs configured in the trusted client CA
store with this flag enabled to the user’s
browser for user certificate selection. The
browser prompts the client certificates whose
issuer CA and/or root CA is in that list. This
option allows you to control which client
certificate(s) are prompted for selection.
Clearing this option for all certificates in a CA
chain results in those certificates not being
prompted.
Specifies if you want
to have the CA
participate in client
certificate selection
for authentication.
Participate in Client
Certificate Negotiation
Use
Browse
to select and import the trusted
client files from.
Specifies the trusted
client file that you
can import from the
database.
Import from
OCSP > Settings tab
Select a value from the drop-down list. The list
includes:
•
Responder specified in CA certificate
•
Manually configured responders
•
Responder specified in Client certificate
Specifies the OCSP
method that the
device uses to verify
client certificate
status.
OCSP settings
Select a value from the drop-down list.
Specifies the device
certificate that is
used to sign for the
request.
Device Certificate to
sign the request
Select the check box to enable this option.
Specifies the device
to use nonce.
Use Nonce
CRL Settings tab
Select the check box to enable this option.
Specifies the CDP(s)
in the trusted client
CA.
CDP(s) specified in the
Trusted Client CA
Select the check box to enable this option.
Specifies the CDP(s)
in the client
certificate.
CDP(s) specified in the
client certificate
Select the check box to enable this option.
Specifies the manual
configured CDPs.
Manual configured CDP
Select the frequency of the CRL download. The
default value is 1440.
Specifies the
frequency of the CRL
download.
CRL Download
Frequency (minutes)
187
Copyright © 2010, Juniper Networks, Inc.
Chapter 11: Configuring Authentication and Directory Servers
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...