Table 61: Configuring SAML Access Control Resource Policy
Details
(continued)
Select the
Ignore Query data
check box
to enable this feature.
Specifies that the Secure Access
device should remove the query
string from the URL before requesting
authorization or caching the
authorization response.
Ignore Query
data
SAML ACL > Role
Select a role and click
Add
to add roles
from the Non-members to the Members
list.
Maps roles to access control policy
resources.
NOTE: The Role tab is enabled only
when you select
Policy applies to
SELECTED roles
or
Policy applies to
all roles OTHER THAN those
selected below
from the Action
drop-down list.
Role
SAML ACL > Detailed Rules tab
Specify one of the following options:
•
Boolean expressions: Using system
variables, write one or more Boolean
expressions using the NOT, OR, or
AND operators.
•
Custom expressions: Using the
custom expression syntax, write one
or more custom expressions.
Specifies one or more expressions to
evaluate to perform the action.
Conditions
Related
Documentation
Configuring SAML SSO Artifact Profile Resource Policy (NSM Procedure) on page 226
•
•
Setting Up Secure Access Device Host Checker Options (NSM Procedure) on page 231
Configuring SAML SSO Artifact Profile Resource Policy (NSM Procedure)
Configure SAML SSO Artifact profile resource policy to communicate using the artifact
profile (also called Browser/Artifact profile) the trusted access management server
“pulls” authentication information from the Secure Access device.
To configure SAML SSO artifact profile resource policy:
1.
In the navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab,
and then double-click the Secure Access device for which you want to configure a
SAML Artifact Profile resource policy.
2.
Click the
Configuration
tab. Select
Users
>
Resource Policies
>
Web
>
SAML SSO
.
3.
Add or modify settings as specified in Table 62 on page 227.
4.
Click one:
•
OK
—Saves the changes.
Copyright © 2010, Juniper Networks, Inc.
226
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...