![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 238](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862238.webp)
Table 59: Configuring Basic, NTLM, and Kerberos Resources
(continued)
Your Action
Options
General > NTLM
Select the
Enable NTLM SSO
check box to enable NTLM SSO. If you do not enter
any configuration information, the device attempts to figure out the domain from
the hostname and performs SSO using the system credentials.
Enable NTLM SSO
Select the
Fallback to NTLM V2
check box to fall back to NTLMv1 if Kerberos fails.
If you do not select this option and Kerberos SSO fails, an intermediation page
appears.
Fallback to NTLM V1
General > NTLM > NTLM Intermediation > New NTLM Intermediation
Enter a name to uniquely identify the NTLM intermediation. No external mapping is
made to the label value.
Label
Enter the Active Directory domain name.
domain
Select one of the following options from the drop-down list:
•
System
—Specifies the set of user credentials, such as primary and secondary
authorization credentials, stored in the device. If you select this option, you do not
need to enter the username and password.
•
Variable
—Allows tokens such as username and password to be used in the
Username and Password boxes.
•
Static
—Specifies the username and password exactly as they are entered in the
Username and Password boxes.
Credential Type
Enter the account username. If you select
Variable
as the credential type, you can
enter the username token.
Username
Enter an account password.
Password
Enter the password token if you select
Variable
as the credential type.
Variable Password
General > Basic Authentication
Select the
Enable Basic Authentication SSO
check box to enable basic
authentication SSO.
Enable Basic Authentication SSO
General > Basic Authentication > Basic Auth Intermediation > New Basic Auth Intermediation
Enter a name to uniquely identify the basic authentication intermediation. No external
mapping is made to the label value.
Label
Select one of the following options from the drop-down list:
•
System
—Specifies the set of user credentials, such as primary and secondary
authorization credentials, stored in the device. If you select this option, you do not
need to enter the username and password.
•
Variable
—Allows tokens such as username and password to be used in the
Username and Password boxes.
•
Static
—Specifies the username and password exactly as they are entered in the
Username and Password boxes.
Credential Type
Copyright © 2010, Juniper Networks, Inc.
220
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...