Configuring Secure Access Authentication Policies (NSM Procedure)
An authentication policy is a set of rules that controls one aspect of access
management—whether or not to present a realm’s sign-in page to a user. An
authentication policy is part of an authentication realm’s configuration, specifying rules
for the Secure Access device to consider before presenting a sign-in page to a user.
To configure an authentication realm policy:
1.
In the NSM navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab, and then double-click the Secure Access device for which you want to configure
an authentication realm policy.
2.
Click the
Configuration
tab, and then select
Administrators
>
Admin Realms
or
User
or
Users Realms
. The corresponding workspace appears.
3.
Click the
New
button. The New dialog box appears.
4.
Configure the server using the settings described in Table 52 on page 198.
5.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 52: Authentication Realm Policies Configuration Details
Your Action
Function
Option
Authentication Policies > Source IP tab
Select any one of the following options from
the drop-down list:
•
Users from any IP address
— Enables users
to sign into the Secure Access device from
any IP address to satisfy the access
management requirement.
•
User from IP addresses which pass the
specified matching policies
—Enables users
to sign into the Secure Access device from
IP addresses that have passed the specified
matching policies.
Cntrolsfrom which IP
addresses users can access a
Secure Access device sign-in
page, be mapped to a role, or
access a resource.
Allow
Enter the IP address.
NOTE: The
new
button is enabled only when
you select
User from IP addresses which
pass the specified matching policies
option
from the Allow drop-down list.
Specifies the IP address of the
sender.
Source IP
Address
Enter the IP netmask.
NOTE: The
new
button is enabled only when
you select
Allow or deny users from the
following IP addresses
option from the Allow
drop-down list.
Specifies the IP Netmask.
Source IP
Netmask
Copyright © 2010, Juniper Networks, Inc.
198
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...