Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 158

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
140
Table 33: Configuring File Rewriting Resource Policies Details (continued)
Option
Action
Username
Variable Password
Function
Specifies the action to take
when a resource requires
credentials.
Specifies a username to
submit to the Windows share
or directory.
NOTE: This box is enabled
only when you select the Use
Specified
Credentials(Variable
Password)... or Use Specified
Credential(Fixed Password)...
options from the Action
drop-down list.
Specifies a variable password
to Windows share or directory.
NOTE: This box is enabled
only when you select the Use
Specified
Credentials(Variable
Password)... option from the
Action drop-down list.
Copyright © 2010, Juniper Networks, Inc.
Your Action
Select one of the following
options from the drop-down
list:
Use Specified
Credentials(Variable
Password)...—Secure
Access device uses
specified credentials with
variable password to pass
to the Windows share or
directory
Use Specified
Credentials(Fixed
Password)...—Secure
Access device uses
specified credentials with
fixed password to pass to
the Windows share or
directory.
Prompt for user
credentials—Secure Access
device intermediates the
share challenge by
presenting an
authentication challenge in
the Secure Access device
the first time a user
attempts to access the
share.
Detailed Rules—Specifies
one or more detailed rules
for this policy.
Enter a variable. For example
enter <USERNAME> or a static
username. For example,
administrator to submit to the
Windows share or directory.
NOTE: When entering a
variable, you may also include
a domain. For example enter
yourcompany.net\<USERNAME>
Enter the variable password.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents