Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 96

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
Related
Documentation
78
Table 17: User Role SAM Configuration Details (continued)
Option
User can add applications
Automatic host-mapping
Skip web-proxy registry check
Auto-close JSAM window on
sign-out
Configuring Secure Meeting on a Secure Access Device User Role (NSM Procedure)
on page 79
Configuring Terminal Services on a Secure Access Device User Role (NSM Procedure)
on page 52
Configuring WSAM Resource Profile (NSM Procedure) on page 131
Function
Enables user to add
applications.
Allows the Secure Application
Manager to edit the Windows
PC hosts file and replaces
entries of Windows application
servers with localhost. These
entries are changed back to
the original data when a user
closes the Secure Application
Manager.
Does not have JSAM check a
user's registry for a Web proxy.
Some users do not have
permissions to look at their
registries. If JSAM tries to look
at their registries, then users
see an error that they do not
have permission. This option
ensures that users do not see
this message.
Enables JSAM to
automatically close when a
user signs out of the Secure
Access device by clicking Sign
Out in the Secure Access
device browser window. JSAM
continues to run if the user
simply closes the browser
window.
Copyright © 2010, Juniper Networks, Inc.
Your Action
Select the User can add
applications check box to
enable this feature.
Select the Automatic
host-mapping check box to
enable this feature.
Select the Skip web-proxy
registry check check box to
enable this feature.
Select the Auto-close JSAM
window on sign-out check box
to enable this feature.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents