CHAPTER 11
Configuring Authentication and Directory
Servers
•
Configuring a Secure Access ACE Server Instance (NSM Procedure) on page 161
•
Creating a Custom Expression for an Authentication Server (NSM Procedure) on page 163
•
Configuring a Secure Access Local Authentication Server Instance (NSM
Procedure) on page 164
•
Configuring a Secure Access LDAP Server Instance (NSM Procedure) on page 167
•
Configuring a Secure Access RADIUS Server Instance (NSM Procedure) on page 171
•
Configuring a Secure Access Anonymous Server Instance (NSM Procedure) on page 174
•
Configuring a Secure Access eTrust SiteMinder Server Instance (NSM
Procedure) on page 174
•
Configuring a Secure Access Certificate Server Instance (NSM Procedure) on page 184
•
Configuring a Secure Access Manual CA Certificate (NSM Procedure) on page 185
•
Configuring a Secure Access SAML Server Instance (NSM Procedure) on page 188
•
Configuring a Secure Access Active Directory or NT Domain Instance (NSM
Procedure) on page 190
•
Configuring a Secure Access NIS Server Instance (NSM Procedure) on page 193
Configuring a Secure Access ACE Server Instance (NSM Procedure)
When authenticating users with an RSA ACE server, users might sign in using two methods:
•
Using a hardware token and the standard sign-in page
— The user enters the username
and password in the standard sign-in page. The device then forwards the credentials
to the ACE server.
•
Using a software token and the custom SoftID sign-in page
— The user browses to
the SoftID custom sign-in page. Using the SoftID plug-in, the user enters his or her
username and PIN. The SoftID plug-in generates a pass phrase by concatenating the
user’s PIN and token and passes the pass phrase to the device. For information about
enabling the SoftID custom sign-in pages, see the
Custom Sign-In Pages Solution Guide
.
161
Copyright © 2010, Juniper Networks, Inc.
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...