Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 223

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
Table 53: Role Mapping Rules Configuration Details (continued)
Option
Function
New
Specifies the rules that
are used for matching.
Attribute
Specifies the role
mapping role attributes.
NOTE: This option is
enabled only if you select
if certificate has any of
the attributes as the role
mapping rule type.
Configuring Secure Access Sign-In Policies (NSM Procedure) on page 207
Configuring Secure Access Authentication Policies (NSM Procedure) on page 198
Chapter 12: Configuring Authentication Realms
Your Action
Enter the respective rule matching entries.
NOTE:
Enter a new username if you select if
username as role mapping rule type.
Enter a new expression if you select if user
has any of these custom expressions as role
mapping rule type.
Enter a new value if you select if certificate
has any of the attributes as role mapping
rule type.
Enter an attribute name.
205

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents