Table 15: How to Authenticate Users
(continued)
Authorization
Authentication Results
Domain
Auth
Mode
User
Auth
Mode
User in
Local
Database
Rule
Local
Authenticates user locally
first. If fails, RADIUS
authentication is used.
Remote
Local
Defined
2
Local
Authenticates user remotely.
Local
Remote
Defined
3
Local
Authenticates user remotely.
Remote
Remote
Defined
4
Remote
Authenticates user remotely.
Local
—
Not Defined
5
Remote
Authenticates user remotely.
Remote
—
Not Defined
6
Dictionary File
To authenticate local or remote users from a RADIUS server, you must first define role
mapping assignments and domain names in NSM. If you use Steel Belted RADIUS, you
can copy the NSM RADIUS dictionary to your RADIUS server.
This file (
netscreen.dct
) is available in the NSM. If you installed NSM using the default
options, you can find the dictionary in the following location:
/usr/netscreen/GuiSvr/utils/netscreen.dct
RADIUS VSA Definition
RADIUS vendor specific attribute (VSA) is available to allow vendors to support their
own extended attributes. If you use a RADIUS server other than Steel-Belted RADIUS,
you must enter the following NSM attributes in your RADIUS dictionary file.
These attributes are case sensitive and must be entered exactly as they appear below:
ATTRIBUTE NS-NSM-User-Domain-Name 26 [vid=3224 type1=220 len1=+2 data=string]
ATTRIBUTE NS-NSM-User-Role-Mapping 26 [vid=3224 type1=221 len1=+2 data=string]
When a user is defined only in RADIUS, you must define NS-NSM-User-Domain- Name
and role mapping assignment. Auth Handler checks if the domain name matches the
user’s login domain name when NSM authenticates the user. Role mapping lists are used
for NSM access control purposes.
Custom Roles
Figure 14 on page 70 shows the format for a custom role. The format for the custom role
of NS-NSM-User-Role-Mapping is:
domainName1:domainName2.roleName
•
domainName1
is the domain that the current user can access.
•
domainName2
is the domain that the current role (
roleName
) belongs to.
69
Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring Role-Based Administration
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...