Configuring Secure Access Devices Guide
Related
Documentation
Configuring a Secure Access Certificate Server Instance (NSM Procedure)
184
Table 45: Secure Access eTrust SiteMinder Advanced Configuration
Details (continued)
Option
Siteminder Settings > Advanced tab
Authentication Port
Authorization Port
Configuring a Secure Access Certificate Server Instance (NSM Procedure) on page 184
Configuring a Secure Access SAML Server Instance (NSM Procedure) on page 188
Configuring a Secure Access Anonymous Server Instance (NSM Procedure) on page 174
The certificate server feature allows users to authenticate based on attributes contained
in client-side certificates. You may use the certificate server by itself or in conjunction
with another server to authenticate users and map them to roles.
To configure certificate server instance:
In the NSM navigation tree, select Device Manager > Devices. Click the Device Tree
1.
tab, and then double-click the Secure Access device for which you want to configure
user roles.
Click the Configuration tab, and then select System > Configuration > Certificates
2.
> Trusted Client CAs tab to import the CA certificate used to sign the client-side
certificates. The corresponding workspace appears.
Select Authentication > Auth Servers.
3.
Click the New button. The New dialog box appears.
4.
NOTE: If you want to update an existing server instance, click the
appropriate link in the Auth Server Name box, and perform the Steps 5
through 8.
Specify a name to identify the server instance.
5.
Function
The value entered in this field
must match the authentication
port value entered through the
Policy Server Management
Console. By default, this field
matches the policy server's
default setting of 44442.
The value entered in this field
must match the authorization
port value entered through the
Policy Server Management
Console. By default, this field
matches the policy server's
default setting of 44443.
Copyright © 2010, Juniper Networks, Inc.
Your Action
Enter a value.
Enter a value.
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?