Configuring Saml Sso Artifact Profile Resource Policy (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
Related
Documentation

Configuring SAML SSO Artifact Profile Resource Policy (NSM Procedure)

226
Table 61: Configuring SAML Access Control Resource Policy
Details (continued)
Ignore Query
Specifies that the Secure Access
data
device should remove the query
string from the URL before requesting
authorization or caching the
authorization response.
SAML ACL > Role
Role
Maps roles to access control policy
resources.
NOTE: The Role tab is enabled only
when you select Policy applies to
SELECTED roles or Policy applies to
all roles OTHER THAN those
selected below from the Action
drop-down list.
SAML ACL > Detailed Rules tab
Conditions
Specifies one or more expressions to
evaluate to perform the action.
Configuring SAML SSO Artifact Profile Resource Policy (NSM Procedure) on page 226
Setting Up Secure Access Device Host Checker Options (NSM Procedure) on page 231
Configure SAML SSO Artifact profile resource policy to communicate using the artifact
profile (also called Browser/Artifact profile) the trusted access management server
"pulls" authentication information from the Secure Access device.
To configure SAML SSO artifact profile resource policy:
In the navigation tree, select Device Manager > Devices. Click the Device Tree tab,
1.
and then double-click the Secure Access device for which you want to configure a
SAML Artifact Profile resource policy.
Click the Configuration tab. Select Users > Resource Policies > Web > SAML SSO.
2.
Add or modify settings as specified in Table 62 on page 227.
3.
Click one:
4.
OK—Saves the changes.
Select the Ignore Query data check box
to enable this feature.
Select a role and click Add to add roles
from the Non-members to the Members
list.
Specify one of the following options:
Boolean expressions: Using system
variables, write one or more Boolean
expressions using the NOT, OR, or
AND operators.
Custom expressions: Using the
custom expression syntax, write one
or more custom expressions.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents