Configuring A Secure Application Manager Resource Policy; Configuring A Secure Application Manager Resource Policy (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide

Configuring a Secure Application Manager Resource Policy (NSM Procedure)

144
When you enable the secure application manager access feature for a role, you need to
create resource policies that specify which application servers a user may access. These
policies apply to both the Java version and the Windows version of the Secure Application
Manager (JSAM and WSAM, respectively). When a user makes a request to an application
server, the Secure Access device evaluates the SAM resource policies. If the Secure
Access device matches a user's request to a resource listed in a SAM policy, the Secure
Access device performs the action specified for the resource.
To configure Secure Application Manager resource policy:
In the navigation tree, select Device Manager > Devices. Click the Device Tree tab,
1.
and then double-click the Secure Access device for which you want to configure a
Secure Application Manager resource policy.
Click the Configuration tab. Select Users > Resource Policies > SAM.
2.
Add or modify settings as specified in Table 34 on page 144.
3.
Click one:
4.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 34: Secure Application Manager Resource Policy Configuration
Details
Option
Function
Access Control > General tab
Name
Specifies the name for the policy.
Description
Describes the policy.
New
Specifies the servers to which this
Resources
policy applies.
Applies to
Specifies the roles to which this
roles
policy applies.
Your Action
Enter the name.
Enter a description.
Enter the server path.
Select one of the following options from the
drop-down list:
All—Applies the policy to all users.
Selected—Applies the policy only to users
who are mapped to roles in the Role
Selection section.
Except those selected—Specifies one or
more detailed rules for this policy.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents