![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 96](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862096.webp)
Table 17: User Role SAM Configuration Details
(continued)
Your Action
Function
Option
Select the
User can add
applications
check box to
enable this feature.
Enables user to add
applications.
User can add applications
Select the
Automatic
host-mapping
check box to
enable this feature.
Allows the Secure Application
Manager to edit the Windows
PC hosts file and replaces
entries of Windows application
servers with localhost. These
entries are changed back to
the original data when a user
closes the Secure Application
Manager.
Automatic host-mapping
Select the
Skip web-proxy
registry check
check box to
enable this feature.
Does not have JSAM check a
user's registry for a Web proxy.
Some users do not have
permissions to look at their
registries. If JSAM tries to look
at their registries, then users
see an error that they do not
have permission. This option
ensures that users do not see
this message.
Skip web-proxy registry check
Select the
Auto-close JSAM
window on sign-out
check box
to enable this feature.
Enables JSAM to
automatically close when a
user signs out of the Secure
Access device by clicking
Sign
Out
in the Secure Access
device browser window. JSAM
continues to run if the user
simply closes the browser
window.
Auto-close JSAM window on
sign-out
Related
Documentation
Configuring Secure Meeting on a Secure Access Device User Role (NSM Procedure)
on page 79
•
•
Configuring Terminal Services on a Secure Access Device User Role (NSM Procedure)
on page 52
•
Configuring WSAM Resource Profile (NSM Procedure) on page 131
Copyright © 2010, Juniper Networks, Inc.
78
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...