CHAPTER 12
Configuring Authentication Realms
•
Configuring Secure Access Authentication Realms (NSM Procedure) on page 195
•
Configuring Secure Access Authentication Policies (NSM Procedure) on page 198
•
Configuring Secure Access Role Mapping Rules (NSM Procedure) on page 203
Configuring Secure Access Authentication Realms (NSM Procedure)
An authentication realm specifies the conditions that users must meet to sign into the
Secure Access device.
To configure an authentication realm:
1.
In the NSM navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab, and then double-click the Secure Access device for which you want to configure
authentication realms.
2.
Click the
Configuration
tab, select
Administrators
>
Admin Realms
or
Users
>
User
Realms
. The corresponding workspace appears.
3.
Click the
New
button. The New dialog box appears.
4.
Configure the server using the settings described in Table 51 on page 195.
5.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 51: Secure Access Authentication Realms Configuration Details
Your Action
Function
Option
General tab
Enter a name.
Specifies the name of the realm.
Realm Name
Enter a description.
Describes the realm.
Description
Select
General > When editing, start
on the Role Mapping page
to enable
this option.
Specifies that the Role Mapping tab
is selected when you open the
realm for editing.
When editing, start
on the Role
Mapping page
195
Copyright © 2010, Juniper Networks, Inc.
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...