Configuring User Roles And Administrator Roles; Chapter 6 Configuring User Roles And Administrator Roles; Configuring Secure Access Device User Roles (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

CHAPTER 6
Configuring User Roles and Administrator
Roles

Configuring Secure Access Device User Roles (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.
Configuring Secure Access Device User Roles (NSM Procedure) on page 35
Creating Secure Access Role-Based Source IP Alias (NSM Procedure) on page 38
Configuring Secure Access General Session Options (NSM Procedure) on page 39
Creating and Configuring Secure Access Device Administrator Roles (NSM
Procedure) on page 43
A user role is an entity that defines user session parameters, personalization settings,
and enabled access features. You can customize a user role by enabling specific Secure
Access device access features, defining Web, application, and session bookmarks, and
configuring session settings for the enabled access features. You can create and configure
user roles through the User Roles page from the Secure Access device configuration tree.
To configure a user role:
In the NSM navigation tree, select Device Manager > Devices. Click the Device Tree
1.
tab and then, double-click the Secure Access device for which you want to configure
user roles.
Click the Configuration tab, select Users > User Roles. The corresponding workspace
2.
appears.
Click the New button and the New dialog box appears.
3.
Add or modify settings on the General tab page as specified in Table 7 on page 36.
4.
Add or modify global role options on the Global Role Options tab page as specified
5.
in Table 8 on page 37.
Click one:
6.
OK—Saves the changes.
Cancel—Cancels the modifications.
35

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents