Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 170

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
152
NOTE: The Role Selections tab is enabled only when you select the
Selected or the
drop-down list.
Enter the name, and specify the resources for the detailed rules.
7.
NOTE: The Detailed Rules tab is enabled only when you select the Detailed
Rules option from the Action drop-down list.
NOTE: To apply detailed rules to the roles, see Step 4.
Specify one or more expressions in the Conditions box to evaluate to perform the
8.
action.
Add or modify more settings as specified in Table 37 on page 152.
9.
Click one:
10.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 37: Configuring Web Rewriting Resource Policy Details
Option
Function
SSO From POST > General tab
POST URL
Specifies the absolute URL where
the application posts the user's
credentials. such as:
http://yourcompany.com/login.cgi.
Deny direct login
Allows users to not access the URL
for this resource
directly.
Allow multiple
Allows Secure Access device to send
POSTs to this
POST and cookie values to the
resource
resource multiple times if required.
POST Variables > Label
Label
Specifies the label that appears on
a user's preferences page in the
Secure Access device.
option from the Applies to roles
Except those selected
Your Action
Enter the URL, for example:
http://yourcompany.com/login.cgi.
NOTE: The Secure Access device
does not accept wildcard characters
in this field.
Select the Deny direct login for this
resource to enable this feature.
Select the Allow multiple POSTs to
this resource to enable this feature.
Enter the label name.
NOTE: This field is required if you
either enable or require users to
modify data to post to back-end
applications.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager

Table of Contents