![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 222](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862222.webp)
Table 53: Role Mapping Rules Configuration Details
(continued)
Your Action
Function
Option
Select
Admin Realms
>
Role Mapping Rules
>
Settings
>
Stop processing rules when this
rule matches
to enable this option.
Specifies if you want the
device to stop evaluating
role mapping rules if the
user meets the conditions
specified for this rule.
Stop processing
rules when this
rule matches
•
Select
If user name
if the role mapping
parameter must be based on the user name.
Select
is/is not
conditional expressions for
the rule, click the
Add
button, and enter the
new user names.
•
Select
If certificate has any of the attributes
if the role mapping parameter must be based
on the certificate attributes. Select
is/is not
conditional expressions for the rule, click the
Add
button, and enter the new values.
•
Select
If user has any of these custom
expressions
if the role mapping parameter
must be based on the custom expressions.
The collection-of-expressions button
appears.
1.
Click the
collection-of-expressions
button to assign expressions. The
expressions that were created for the
selected authentication server appears.
2. Select an existing expression from the
Non-members area and click
Add
to
assign the expression to the role-mapping
rule.
3. Click
New
and create an expression to
assign a new expression to the
role-mapping rule. For information on
creating custom expressions and using
the Expression Dictionary, refer to
“Creating a Custom Expression for an
Authentication Server (NSM Procedure).”
NOTE: You can create a custom expression in
a device template, but you cannot validate the
custom expression. The Validate button is not
enabled in the Custom Expressions editor for
device templates.
Specifies the type of role
mapping rule.
Role mapping rule
type
Select an option from the drop-down list.
Specifies the conditional
expression used in the
rule.
is/is not
NOTE: This option
is enabled only if
you select either
if
username
or
if
certificate has any
of the attributes
as the role
mapping rule type.
Copyright © 2010, Juniper Networks, Inc.
204
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...