10.02.2013 Views

Juniper Networks Secure Access Administration Guide

Juniper Networks Secure Access Administration Guide

Juniper Networks Secure Access Administration Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table of Contents<br />

Chapter 6 Resource policies 81<br />

Licensing: Resource policies availability .........................................................82<br />

Resource policy components .........................................................................82<br />

Specifying resources for a resource policy ...............................................83<br />

Resource policy evaluation.............................................................................86<br />

Creating detailed rules for resource policies ...................................................87<br />

Writing a detailed rule .............................................................................88<br />

Customizing resource policy UI views ............................................................89<br />

Chapter 7 Authentication and directory servers 91<br />

Licensing: Authentication server availability...................................................92<br />

Task summary: Configuring authentication servers........................................92<br />

Defining an authentication server instance ....................................................93<br />

Defining an authentication server instance..............................................94<br />

Modifying an existing authentication server instance ..............................94<br />

Configuring an anonymous server instance ...................................................94<br />

Anonymous server restrictions ................................................................95<br />

Defining an anonymous server instance..................................................95<br />

Configuring an ACE/Server instance...............................................................96<br />

Defining an ACE/Server instance .............................................................97<br />

Generating an ACE/Agent configuration file .............................................98<br />

Configuring an Active Directory or NT Domain instance ................................99<br />

Defining an Active Directory or Windows NT domain server instance...100<br />

Multi-domain user authentication ..........................................................102<br />

Active Directory and NT group lookup support......................................104<br />

Configuring a certificate server instance........................................................... 105<br />

Configuring an LDAP server instance ...........................................................106<br />

Defining an LDAP server instance .........................................................107<br />

Configuring LDAP search attributes for meeting creators ......................110<br />

Monitoring and deleting active user sessions.........................................110<br />

Enabling LDAP password management .................................................111<br />

Configuring a local authentication server instance .......................................115<br />

Defining a local authentication server instance......................................115<br />

Creating user accounts on a local authentication server.........................117<br />

Managing user accounts ........................................................................118<br />

Delegating user administration rights to end-users ................................119<br />

Configuring an NIS server instance ..............................................................120<br />

Configuring a RADIUS server instance .........................................................120<br />

User experience for RADIUS users.........................................................121<br />

Configuring the IVE to work with a RADIUS server................................122<br />

Enabling RADIUS accounting.................................................................125<br />

Configuring an eTrust SiteMinder server instance ........................................133<br />

eTrust SiteMinder overview ...................................................................134<br />

Configuring SiteMinder to work with the IVE.........................................138<br />

Configuring the IVE to work with SiteMinder.........................................144<br />

Debugging SiteMinder and IVE issues....................................................156<br />

Configuring a SAML Server instance.............................................................156<br />

Using the artifact profile and the POST profile.......................................157<br />

Creating a new SAML Server instance....................................................161<br />

Chapter 8 Authentication realms 165<br />

Licensing: Authentication realms availability................................................166<br />

Creating an authentication realm .................................................................166<br />

Table of Contents � ix

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!