Table 47: Secure Access Manual CA Certificate Configuration Details
Your Action
Function
Option
Settings tab
Enter a subject name for the certificate.
Specifies the CA
certificate subject
name.
Subject
Select one of the following options:
•
None
— Specifies that the device should not
validate this trusted client certificate.
•
Use OCSP (Online Certificate Status
Protocol)
— Specifies that the device should
use the OCSP method, validating the client
certificate in real-time, as needed. After you
select this option, you can specify options
for OCSP.
•
Use CRLs (Certificate Revocation Lists)
—
Specifies that the device should use CRLs
to validate the client certificate. After you
select this option, you can specify options
for CRL.
•
Use OCSP with CRL fallback
—Specifies that
the device should use the OCSP validation
method when possible, but attempt to
validate client certificates using CRLs should
the OCSP method fail (for example, if the
link to the OCSP Responder fails). After you
select this option, you can specify options
for both CRL and OCSP.
Specifies the method
the device uses to
verify client
certificate status.
Client certificate status
checking
Select the check box.
Specifies if you want
the device to
validate the CRL
from which the
certificate is issued.
Verify Trusted Client CA
Select the check box.
NOTE: If you added this certificate for
nonauthentication purposes (such as for SAML
signature verification or machine certificate
validation), disable this option. This indicates
that the device must not trust any client
certificate issued by this CA.
Specifies if you want
the device to trust
this certificate when
authenticating client
certificates.
Trusted for Client
Authentication?
Copyright © 2010, Juniper Networks, Inc.
186
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...