Table 61: Configuring SAML Access Control Resource Policy
Details
(continued)
Select one of the following options from
the drop-down list:
•
Policy applies to ALL roles
—Applies
this policy to all users.
•
Policy applies to SELECTED
roles
—Applies this policy only to
users who are mapped to roles in the
selected roles list.
•
Policy applies to all roles OTHER
THAN those selected
below
—Applies this policy to all
users except for those who map to
the roles in the selected roles list.
Specifies the roles to which this
policy applies.
Role
application
Select one of the following options from
the drop-down list:
•
Use SAML
—Secure Access device
performs an access control check to
the specified URL.
•
Do not use SAML
—Secure Access
device does not perform an access
control check.
•
Use Detailed Rules
—Specifies one
or more detailed rules for this policy.
Allows or denies the Secure Access
device to perform an access control
check.
Action
Enter the URL, using the
format:https://hostname/ws.
Specifies the URL of the access
management system’s SAML server.
SAML Web
Service URL
Enter a unique string.
Specifies the hostname of the issuer,
which in most cases is the hostname
of the access management system.
SAML Web
Service Issuer
Select one of the following options from
the drop-down list:
•
None
—Does not authenticate the
Secure Access device.
•
Username/Password
—Authenticates
the Secure Access device using a
username and password.
•
Certificate
—Authenticates the
Secure Access device using a
certificate signed by a trusted
certificate authority.
Specifies the authentication method
that the SAML Web service should
use to authenticate the Secure
Access device.
Authentication
Type
Copyright © 2010, Juniper Networks, Inc.
224
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...