Table 52: Authentication Realm Policies Configuration Details
(continued)
Your Action
Function
Option
Select one of the following options from the
drop-down list:
Allow
—Allows users to sign in from the
specified IP address.
Deny
—Prevents users from signing in from
the specified IP address.
Allows or denies users to sign
in from the specified IP
address.
Access
Authentication Policies > Browser tab
Select one of the following options from the
drop-down list:
Browsers with any user-agent
—Allows you
to sign into the device from any browser and
the device submits the user credentials to the
authentication server.
Browsers whose user-agents pass the
matching policies defined below
—Allows
you to sign in from a browser whose
user-agent string meets the specified pattern
requirements for the selected authentication
realm.
Controls from which Web
browsers users/admins can
access the sign-in page of the
Secure Access device, be
mapped to a role, or access a
resource. You are prompted
with a sign-in attempt failed
error message when you try to
sign in to the device using an
unsupported browser.
Allow
Enter a string in the format
*<browser_string>*
NOTE: This option is enabled only when you
select
Browsers whose user-agents pass the
matching policies defined below
from the
Allow drop-down list and then by clicking
New
.
Specifies the user agent
pattern.
User agent
pattern
Select one of the following options from the
drop-down list:
Allow
—Allows users to use a browser that
has a user-agent header containing the
<browser_string> substring.
Deny
—Prevents users from using a browser
that has a user-agent header containing the
<browser_string> substring.
NOTE: This option is enabled only when you
select
Browsers whose user-agents pass the
matching policies defined below
from the
Allow drop-down list and then by clicking
New
.
Allows or denies users to use a
browser that has a user-agent
header containing the
<browser-string>substring.
Action
Authentication Policies > Certificate tab
199
Copyright © 2010, Juniper Networks, Inc.
Chapter 12: Configuring Authentication Realms
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...