Configuring a Secure Application Manager Resource Policy (NSM Procedure)
When you enable the secure application manager access feature for a role, you need to
create resource policies that specify which application servers a user may access. These
policies apply to both the Java version and the Windows version of the Secure Application
Manager (JSAM and WSAM, respectively). When a user makes a request to an application
server, the Secure Access device evaluates the SAM resource policies. If the Secure
Access device matches a user’s request to a resource listed in a SAM policy, the Secure
Access device performs the action specified for the resource.
To configure Secure Application Manager resource policy:
1.
In the navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab,
and then double-click the Secure Access device for which you want to configure a
Secure Application Manager resource policy.
2.
Click the
Configuration
tab. Select
Users
>
Resource Policies
>
SAM
.
3.
Add or modify settings as specified in Table 34 on page 144.
4.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 34: Secure Application Manager Resource Policy Configuration
Details
Your Action
Function
Option
Access Control > General tab
Enter the name.
Specifies the name for the policy.
Name
Enter a description.
Describes the policy.
Description
Enter the server path.
Specifies the servers to which this
policy applies.
New
Resources
Select one of the following options from the
drop-down list:
•
All
—Applies the policy to all users.
•
Selected
—Applies the policy only to users
who are mapped to roles in the Role
Selection section.
•
Except those selected
—Specifies one or
more detailed rules for this policy.
Specifies the roles to which this
policy applies.
Applies to
roles
Copyright © 2010, Juniper Networks, Inc.
144
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...