Configuring Authentication And Directory Servers; Configuring A Secure Access Ace Server Instance (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

CHAPTER 11
Configuring Authentication and Directory
Servers

Configuring a Secure Access ACE Server Instance (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.
When authenticating users with an RSA ACE server, users might sign in using two methods:
Using a hardware token and the standard sign-in page - The user enters the username
and password in the standard sign-in page. The device then forwards the credentials
to the ACE server.
Using a software token and the custom SoftID sign-in page - The user browses to
the SoftID custom sign-in page. Using the SoftID plug-in, the user enters his or her
username and PIN. The SoftID plug-in generates a pass phrase by concatenating the
user's PIN and token and passes the pass phrase to the device. For information about
enabling the SoftID custom sign-in pages, see the Custom Sign-In Pages Solution Guide.
161

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

This manual is also suitable for:

Network and security manager

Table of Contents