
3.
Add or modify settings on the authorization-only policy as specified in Table 54 on
page 208.
4.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 54: Authorization-Only Policy Configuration Details
Your Action
Function
Option
Enter a valid name that maps to the device’s IP
address.
NOTE: The name must be unique among all the
virtual hostnames used in pass-through proxy’s
hostname mode. Also, do not include the protocol
(for example, http:) in this option.
Accesses the backend
application and sends the
request to the original
requesting Web browser.
Virtual
Hostname
Enter a valid URL for the remote server.
NOTE: You must specify the protocol, hostname,
and port of the server. For example, enter
http://www.mydomain.com:8080/*.
Allows the client to redirect
to this URL. The request
from the virtual hostname
gets transformed as a
request to this URL.
Backend URL
Enter a description for the policy.
Specifies the description of
the policy.
Description
Select the corresponding Netegrity SiteMinder
server.
Specifies the Netegrity
SiteMinder server that
manages user
authentication and access.
Authorization
Server
Select one of the user role options.
NOTE: Only the following user role options are
applicable for authorization-only policies.
•
Allow browsing un-trusted SSL (
Users
>
User
Roles
>
RoleName
>
Web
>
Options
).
•
HTTP connection timeout (
Users
>
User Roles
>
RoleName
>
Web
>
Options
).
•
Source IP restrictions (
Users
>
User Roles
>
RoleName
>
General
>
Restrictions
).
•
Browser restrictions (
Users
>
User Roles
>
RoleName
>
General
>
Restrictions
).
Specifies the user role.
Role Option
Select
Authorization-Only Policies
>
Enable
to
enable this option.
Enables or disables the
individual policy.
Enable
Copyright © 2010, Juniper Networks, Inc.
208
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...