Copyright © 2010, Juniper Networks, Inc.
Table 24: Citrix Listed Application Resource Profile Configuration
Details (continued)
Option
Name
Action
Resource
Citrix Listed Applications > Bookmarks tab > General tab
Name
Description
Applications
Selected Applications
Username
Chapter 9: Configuring Secure Access Resource Profiles
Function
Specifies the name of a policy
that allows or denies users
access to the resource.
Allows or denies user access to
resource.
Specifies the resource name for
which you want to enable
access.
Specifies the name of the
session bookmark of the
resource profile.
Describes the session bookmark
of the resource profile.
Specifies the applications you
want available to the end user.
Specifies the executables to run.
Specifies the username that the
Secure Access device should
pass to the terminal server. You
can enter a static username or
a variable.
Your Action
Enter a name.
Select either Allow or Deny
from the Action drop–down
list.
Enter the resource name.
Enter the name.
Enter a description.
Select one of the following
options from the
Applications drop-down list.
ALL applications—Allows
all executables on the
server to be available to
the end user.
Subset of selected
applications—Allows you
to select executables that
you want available to the
end user.
NOTE: This option is
disabled when you enter
variable credentials, such as
<USERNAME> and
<PASSWORD> while
defining the resource profile.
Enter the executables.
Enter the username.
107
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?
Questions and answers