10.02.2013 Views

Juniper Networks Secure Access Administration Guide

Juniper Networks Secure Access Administration Guide

Juniper Networks Secure Access Administration Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Defining an authentication realm<br />

Figure 9: Authentication > Auth. Servers > Test Server > Users<br />

Chapter 1: Initial Verification and Key Concepts<br />

An authentication realm is a grouping of authentication resources, including:<br />

� An authentication server, which verifies a user’s identity. The IVE forwards<br />

credentials submitted on a sign-in page to an authentication server.<br />

� An authentication policy, which specifies realm security requirements that<br />

need to be met before the IVE submits credentials to an authentication server<br />

for verification.<br />

� A directory server, which is an LDAP server that provides user and group<br />

attribute information to the IVE for use in role mapping rules and resource<br />

policies (optional).<br />

� Role mapping rules, which are conditions a user must meet in order for the IVE<br />

to map a user to one or more roles. These conditions are based on information<br />

returned by the realm's directory server, the person’s username, or certificate<br />

attributes.<br />

Creating a test scenario to learn IVE concepts and best practices � 13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!