Table 53: Role Mapping Rules Configuration Details
(continued)
Your Action
Function
Option
Select
Admin Realms
>
Role Mapping Rules
>
Settings
>
Stop processing rules when this
rule matches
to enable this option.
Specifies if you want the
device to stop evaluating
role mapping rules if the
user meets the conditions
specified for this rule.
Stop processing
rules when this
rule matches
•
Select
If user name
if the role mapping
parameter must be based on the user name.
Select
is/is not
conditional expressions for
the rule, click the
Add
button, and enter the
new user names.
•
Select
If certificate has any of the attributes
if the role mapping parameter must be based
on the certificate attributes. Select
is/is not
conditional expressions for the rule, click the
Add
button, and enter the new values.
•
Select
If user has any of these custom
expressions
if the role mapping parameter
must be based on the custom expressions.
The collection-of-expressions button
appears.
1.
Click the
collection-of-expressions
button to assign expressions. The
expressions that were created for the
selected authentication server appears.
2. Select an existing expression from the
Non-members area and click
Add
to
assign the expression to the role-mapping
rule.
3. Click
New
and create an expression to
assign a new expression to the
role-mapping rule. For information on
creating custom expressions and using
the Expression Dictionary, refer to
“Creating a Custom Expression for an
Authentication Server (NSM Procedure).”
NOTE: You can create a custom expression in
a device template, but you cannot validate the
custom expression. The Validate button is not
enabled in the Custom Expressions editor for
device templates.
Specifies the type of role
mapping rule.
Role mapping rule
type
Select an option from the drop-down list.
Specifies the conditional
expression used in the
rule.
is/is not
NOTE: This option
is enabled only if
you select either
if
username
or
if
certificate has any
of the attributes
as the role
mapping rule type.
Copyright © 2010, Juniper Networks, Inc.
204
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...