Table 60: Basic Authentication, NTLM, or Kerberos Intermediation Policy
(continued)
Your Action
Options
Detailed Rules tab
Enter the detailed rule information as described in the General tab section of Table 60 on
page 222.
Detailed Rule
Click
New Expression
and enter a condition name for the rule. You can also set conditions
for the rule. Conditions include logical operators, prebuilt expressions, variables, and so
on.
Conditions
Related
Documentation
Configuring a SAML Access Control Resource Policy (NSM Procedure) on page 223
•
•
Configuring SAML SSO Artifact Profile Resource Policy (NSM Procedure) on page 226
•
Configuring Basic, NTLM, and Kerberos Resources (NSM Procedure) on page 218
Configuring a SAML Access Control Resource Policy (NSM Procedure)
When enabling access control transactions to a trusted access management system,
the Secure Access device and trusted access management system exchanges information.
To configure a SAML access control resource policy:
1.
In the navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab,
and then double-click the Secure Access device for which you want to configure a
SAML access control resource policy.
2.
Click the
Configuration
tab. Select
Users
>
Resource Policies
>
Web
>
SAML ACL
.
3.
Add or modify settings as specified in Table 61 on page 223.
4.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 61: Configuring SAML Access Control Resource Policy Details
SAML ACL > General tab or Detailed Rule tab
Enter the name.
Specifies the name of the policy.
Name
Enter the policy.
Describes the policy.
Description
Enter the resources.
Specifies the resources to which this
policy applies.
New Resources
223
Copyright © 2010, Juniper Networks, Inc.
Chapter 14: Configuring Single Sign-On
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...