Table 51: Secure Access Authentication Realms Configuration
Details
(continued)
Your Action
Function
Option
Select the mode of submission of
password to the secondary
authentication server from the
drop-down list:
•
Username is specified by user on
sign-in page
—Prompts the user
to manually submit his password
to the secondary server during the
Secure Access device sign-in
process.
•
Predefined user name
template
—Automatically submits
a password to the secondary
server during the Secure Access
device sign-in process.
Specifies the password for the
secondary authentication server.
Password for
Secondary Auth
Enter static text or a valid variable.
Specifies the predefined password.
Predefined
Password
Select
General > Enable Dynamic
policy evaluation
to enable an
automatic timer for dynamic policy
evaluation of this realm’s
authentication policy, role mapping
rules, and role restrictions.
Uses dynamic policy evaluation for
this realm.
Enable Dynamic
policy evaluation
Select
General > Refresh roles
to
enable this option.
Refreshes the roles of all users in
this realm. (This option does not
control the scope of the Refresh
Now button.)
Refresh roles
Select
General > Refresh policies
to
enable this option.
Refreshes the resource policies (not
including Meeting and Email Client)
for all users in this realm. (This
option does not control the scope
of the Refresh Now button.)
Refresh policies
Ener the number of minutes (5 to
1440).
Specifiesy how often you want the
Secure Access device to perform
an automatic policy evaluation of
all currently signed-in realm users.
Refresh interval
(minutes)
Related
Documentation
Configuring Secure Access Authentication Policies (NSM Procedure) on page 198
•
•
Configuring Secure Access Role Mapping Rules (NSM Procedure) on page 203
•
Configuring Secure Access Sign-In Policies (NSM Procedure) on page 207
197
Copyright © 2010, Juniper Networks, Inc.
Chapter 12: Configuring Authentication Realms
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...