Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 125

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 24: Citrix Listed Application Resource Profile Configuration
Details (continued)
Option
Name
Action
Resource
Citrix Listed Applications > Bookmarks tab > General tab
Name
Description
Applications
Selected Applications
Username
Chapter 9: Configuring Secure Access Resource Profiles
Function
Specifies the name of a policy
that allows or denies users
access to the resource.
Allows or denies user access to
resource.
Specifies the resource name for
which you want to enable
access.
Specifies the name of the
session bookmark of the
resource profile.
Describes the session bookmark
of the resource profile.
Specifies the applications you
want available to the end user.
Specifies the executables to run.
Specifies the username that the
Secure Access device should
pass to the terminal server. You
can enter a static username or
a variable.
Your Action
Enter a name.
Select either Allow or Deny
from the Action drop–down
list.
Enter the resource name.
Enter the name.
Enter a description.
Select one of the following
options from the
Applications drop-down list.
ALL applications—Allows
all executables on the
server to be available to
the end user.
Subset of selected
applications—Allows you
to select executables that
you want available to the
end user.
NOTE: This option is
disabled when you enter
variable credentials, such as
<USERNAME> and
<PASSWORD> while
defining the resource profile.
Enter the executables.
Enter the username.
107

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager

Table of Contents