Table 48: SAML Server Instance Configuration Details
(continued)
Your Action
Function
Option
Enter the string.
Specifies the user name template, which is a
mapping string from the SAML assertion to a
Secure Access user realm.
User Name
Template
Enter the allowed clock
skew value.
Determines the maximum allowed difference
in time between the Secure Access device
clock and the source site clock.
Allow Clock Skew
(minutes)
SAML Settings > Artifact SSO tab
Enter the Source ID.
Specifies the 20- byte identifier that the
Secure Access device uses to recognize an
assertion from a given source site.
Source ID
Enter a URL.
NOTE: You should specify
this URL in the form of an
HTTPS: protocol.
Specifies the source SOAP responder service
URL.
Source SOAP
Responder Service
URL
Select either
HTTP Basic
or
SSL Client Certificate
.
Specifies the SOAP client authentication.
SOAP Client
Authentication
Enter the username.
Specifies the username for SOAP client
authentication.
Username
Enter the password.
Specifies password for SOAP client
authentication.
Password
Select a device certificate
the drop-down list.
Specifies the device certificate.
Device Certificate
SAML Settings > POST SSO tab
Enter the name or browse
to locate the response
signing certificate.
Specifies the response signing cerificate for
the SAML response signature verification.
This is the PEM-formatted signing certificate,
which is loaded for the SAML response
signature verification. The certificate you
select should be the same certificate used for
signing the SAML response at the source site.
The source site may send this certificate along
with the SAML response, depending on the
source site configuration. By default, the
system performs signature verification of the
SAML response first on the locally configured
certificate. If a certificate is not configured
locally in the SAML authentication server, then
the system performs the signature verification
on the certificate included in the SAML
response from the source site.
Response Signing
Certificate
Issued To details is
displayed.
Displays name and attributes of the entity to
whom the certificate is issued.
Issued To
189
Copyright © 2010, Juniper Networks, Inc.
Chapter 11: Configuring Authentication and Directory Servers
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...