Table 52: Authentication Realm Policies Configuration Details
(continued)
Your Action
Function
Option
Select one of the following options from the
drop-down list:
Allow all users (passwords of any
length)
—Does not apply password length
restrictions to users signing in to the Secure
Access device.
Only allow users that have passwords of a
minimum length
—Requires the user to enter
a password with a minimum length of the
number specified.
Restricts the Secure Access
device and resource access by
password-length to the
secondary authentication
server when administrators or
users try to sign in to an Secure
Access device. The user must
enter a password whose length
meets the minimum
password-length requirement
specified for the realm.
Options for
secondary
authentication
server
Enter the number.
Specifies password length
restrictions.
Secondary
password
minimum
length
(character)
Authentication Policies > Host Checker tab
Select
Authentication Policies > Host
Checker >Evaluate ALL policies
to enable
this feature.
Evaluates all the policies
without enforcing the policy on
the client and allows user
access.
Evaluate ALL
policies
Select
Authentication Policies > Host
Checker >Enforce ALL policies
to enable this
feature.
Enforces all the policies on the
client for the user to log in to
the specified realm.
Enforce ALL
policies
Select the policy, and then click
Add
.
Evaluates the selected policies
without enforcing the policy on
the client and allows user
access.
Evaluate
selected
policies
Select a policy, and then click
Add
.
Enforces the policies on the
client for the user to log in to
the specified realm.
Enforce
selected
policies
Select one of the following options from the
drop-down list:
allow access to realm if any ONE of the
selected Require & Enforce policies
succeed
—User can access the realm if he
meets the requirements of any one of the
selected Host Checker policies.
Allow access only if all of the Require &
Enforce policies succeed
—User can access
the realm only if he meets all of the
requirements in all of the selected policies.
Does not require users to meet
all of the requirements in all of
the selected policies. Instead,
the user can access the realm
if he meets the requirements
of any one of the selected Host
Checker policies.
Evaluate logic
Authentication Policies > Cache Cleaner tab
201
Copyright © 2010, Juniper Networks, Inc.
Chapter 12: Configuring Authentication Realms
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...