4.
Click the
New
icon to configure the options as described in Table 60 on page 222.
5.
Click
OK
to save the changes.
Table 60: Basic Authentication, NTLM, or Kerberos Intermediation Policy
Your Action
Options
General tab
Enter a name to label the policy.
Name
Enter a description for the policy.
Description
Enter the resource name to which this policy applies.
Resources
Select any of the following options from the drop-down list:
•
All
—Allows you to apply this policy to all users.
•
Selected
—Allows you to apply this policy only to users who are mapped to roles in the
Members list. In the Roles tab, you must add roles as members, from the Non-members
list.
•
Except those selected
—Allows you to apply this policy to all users except for the users
who map to the roles in the
Members
list.
Applies to roles
Select any of the following options from the drop-down list:
•
Disable SSO
—Specifies that the device disables the automatic SSO authentication for
this user role, and prompts the user for sign-in credentials.
•
Basic Authentication
—Specifies that the device uses the basic authentication
intermediation method to control the SSO behavior.
•
Disable Intermediation (Not valid for web proxies)
—Specifies that in selecting this
option, the device does not intermediate the challenge or response sequence.
•
NTLM Authentication
—Specifies that the device uses the Microsoft NTLM intermediation
method to control the SSO behavior.
•
Kerberos Authentication
—Specifies that the device uses the Kerberos intermediation
method to control the SSO behavior.
•
Constrained Delegation
—Specifies that the device uses the constrained delegation
intermediation method to control the SSO behavior.
•
Detailed Rules
—Allows you to specify one or more detailed rules for this policy.
Authentication Type
Enter a label name for the basic, NTLM, or Kerberos authentication types, and the
constrained delegation.
Label
Select the
Fallback to NTLM V1
check box to enable this option.
Fallback to NTLM V1
Select the
Fallback to NTLM V2
check box to enable this option.
Fallback to NTLM V2
Select the
Fallback to Kerberos
check box to enable this option.
Fallback to Kerberos
Roles tab
Select roles to access resource policies.
NOTE: This tab is enabled only when you select
Selected
or
Except those selected
from
the Applies to roles drop-down list.
Roles
Copyright © 2010, Juniper Networks, Inc.
222
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...