Table 52: Authentication Realm Policies Configuration Details
(continued)
Your Action
Function
Option
Select one of the following option:
Disable Cache Cleaner
— Does not require
Cache Cleaner to be installed or running for
the user to meet the access requirement.
Just load Cache Cleaner (Loads after IVE
maps the user to a realm)
—Does not require
Cache Cleaner to be running for the user to
meet the access requirement but ensures that
it is available for future use. If you choose this
option for a realm’s authentication policy,
then the Secure Access device downloads
Cache Cleaner to the client machine after the
user is authenticated and before the user is
mapped to any roles on the system.
Load and enforce Cache Cleaner (Loads
before IVE maps the user to a
realm)
—Requires the Secure Access device
to download and run Cache Cleaner for the
user to meet the access requirement. If you
choose this option for a realm’s authentication
policy, then the Secure Access device
downloads Cache Cleaner to the client
machine before the user may access the
Secure Access device sign-in page.
Specifies the cache cleaner
restrictions.
NOTE: The Cache Cleaner tab
is displayed only when you
configure user realm policies.
Cache Cleaner
option
Authentication Policies > Limits tab
Select
Authentication Policies > Limits >
Limit number of concurrent users
to enable
this feature.
Limits the number of
concurrent users on the realm.
Limit number
of concurrent
users
Enter a number.
Specifies any number of users
between zero (0) and the
maximum number of
concurrent users defined for
the realm, or you can set the
number up to the maximum
allowed by your license if there
is no realm maximum.
Guaranteed
minimum
Enter a number.
Specifies any number of
concurrent users from the
minimum number you specified
up to the maximum number of
licensed users. If you enter a
zero (0) into the Maximum box,
no users are allowed to login to
the realm.
Maximum
Related
Documentation
Configuring Secure Access Role Mapping Rules (NSM Procedure) on page 203
•
•
Configuring Secure Access Sign-In Policies (NSM Procedure) on page 207
Copyright © 2010, Juniper Networks, Inc.
202
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...