Configuring Secure Access Authentication Policies (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide

Configuring Secure Access Authentication Policies (NSM Procedure)

198
An authentication policy is a set of rules that controls one aspect of access
management—whether or not to present a realm's sign-in page to a user. An
authentication policy is part of an authentication realm's configuration, specifying rules
for the Secure Access device to consider before presenting a sign-in page to a user.
To configure an authentication realm policy:
In the NSM navigation tree, select Device Manager > Devices. Click the Device Tree
1.
tab, and then double-click the Secure Access device for which you want to configure
an authentication realm policy.
Click the Configuration tab, and then select Administrators > Admin Realms or User
2.
or Users Realms. The corresponding workspace appears.
Click the New button. The New dialog box appears.
3.
Configure the server using the settings described in Table 52 on page 198.
4.
Click one:
5.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 52: Authentication Realm Policies Configuration Details
Option
Function
Authentication Policies > Source IP tab
Allow
Cntrolsfrom which IP
addresses users can access a
Secure Access device sign-in
page, be mapped to a role, or
access a resource.
Source IP
Specifies the IP address of the
Address
sender.
Source IP
Specifies the IP Netmask.
Netmask
Your Action
Select any one of the following options from
the drop-down list:
Users from any IP address— Enables users
to sign into the Secure Access device from
any IP address to satisfy the access
management requirement.
User from IP addresses which pass the
specified matching policies—Enables users
to sign into the Secure Access device from
IP addresses that have passed the specified
matching policies.
Enter the IP address.
NOTE: The new button is enabled only when
you select User from IP addresses which
pass the specified matching policies option
from the Allow drop-down list.
Enter the IP netmask.
NOTE: The new button is enabled only when
you select Allow or deny users from the
following IP addresses option from the Allow
drop-down list.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents