Configuring Infranet Controller Authentication Policies (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01 Manual

Configuring infranet controllers guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01:
Table of Contents

Advertisement

NSM Infranet Controller Configuration Guide

Configuring Infranet Controller Authentication Policies (NSM Procedure)

Related
Documentation
92
Configuring Infranet Controller Authentication Policies (NSM Procedure) on page 92
Configuring Infranet Controller RADIUS Request Attribute Restrictions for User Realms
(NSM Procedure) on page 69
An authentication policy is a set of rules that controls one aspect of access
management—whether or not to present a realm's sign-in page to a user. An
authentication policy is part of an authentication realm's configuration, specifying rules
for the Infranet Controller to consider before presenting a sign-in page to a user. If a user
meets the requirements specified by the realm's authentication policy, then the Infranet
Controller presents the corresponding sign-in page to the user and forwards the user's
credentials to the appropriate authentication server. If this server successfully
authenticates the user, then the Infranet Controller moves on to the role evaluation
process.
To configure an authentication realm policy:
In the NSM navigation tree, select Device Manager > Devices.
1.
Click the Device Tree tab, and then double-click the Infranet Controller device for
2.
which you want to configure an authentication realm policy.
Click the Configuration tab. In the configuration tree, select Administrators > Admin
3.
Realms or Users > User Realms.
Add or modify authentication realm policy settings in the Authentication Policies tab
4.
for one or more of the access management options.
Click one:
5.
OK—Saves the changes.
Cancel—Cancels the modifications.
Configuring Infranet Controller Source IP Access Restrictions (NSM Procedure) on
page 61
Configuring Infranet Controller Browser Access Restrictions (NSM Procedure) on
page 63
Configuring Infranet Controller Certificate Access Restrictions (NSM Procedure) on
page 64
Configuring Infranet Controller Host Checker Access Restrictions (NSM Procedure) on
page 67
Configuring the Number of Concurrent Sessions and Concurrent Users for Infranet
Controller Users (NSM Procedure) on page 70
Configuring Infranet Controller RADIUS Request Attribute Restrictions for User Realms
(NSM Procedure) on page 69
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01 and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents