Related
Documentation
Configuring the Database (NSM Procedure)
Table 83: Configuring the Database
Options
Auto-delete inactive synchronized
user records from the Cache
Time a user record can be idle before
being auto-deleted (days)
Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
Configuring the User Record Synchronization Server (NSM Procedure) on page 279
Configuring the Database (NSM Procedure) on page 281
In the Database, you can delete inactive records from the client cache, retrieve statistics
about the database, export and import the data, and remove user data from the server's
database.
To configure the database:
In the NSM navigation tree, select Device Manager > Devices. Click the Device Tree
1.
tab, and then double-click the Secure Access device for which you want to configure
the database.
Click the Configuration tab, and select System > Configuration > User Record
2.
Synchronization > Database.
Modify settings as described in Table 83 on page 281.
3.
Click OK to save the changes.
4.
Your Action
When you select this option, it removes inactive user records from the cache. The device
performs a check every 15 minutes and deletes user records that meet all of the following
criteria:
There are no active user sessions associated with the user record.
The user record does not have any custom settings or the latest version of the user
record has been synchronized with the user record database.
The authentication server associated with the user record database does not have
type "local."
NOTE: This option does not remove user records from the user record database.
When you select this option, it permanently removes user records from the database
located on the server. Enter the number of days user records must be idle before being
auto-deleted. The default value is none.
Configuring the User Record Synchronization Server (NSM Procedure) on page 279
Configuring the Client (NSM Procedure) on page 280
Chapter 19: Synchronizing User Records
281
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?
Questions and answers