Table 56: Meeting URLs Configuration Details
(continued)
Your Action
Function
Option
Select a meeting sign-in page from the
drop-down list.
Specifies the meeting sign-in
page.
Sign-in Page
Related
Documentation
Configuring Secure Access Sign-In Pages (NSM Procedure) on page 211
•
•
Configuring a SAML Access Control Resource Policy (NSM Procedure) on page 223
Configuring Secure Access Sign-In Pages (NSM Procedure)
A sign-in page defines the customized properties in the end-user’s welcome page such
as the welcome text, help text, logo, header, and footer. It also allows you to create two
types of sign-in pages to present to users and administrators such as standard and
customized sign-in pages.
To configure sign-in policies, you must follow these procedures:
1.
Creating Users/Administrator Sign-in Pages on page 211
2.
Creating Meeting Sign-in Pages on page 213
Creating Users/Administrator Sign-in Pages
To configure a user or administrator sign-in page:
1.
In the NSM navigation tree, select
Device Manager
>
Devices
. Click the Device Tree
tab, and then double-click the Secure Access device for which you want to configure
a user/administrator sign-in page.
2.
Click the
Configuration
tab, and select
Authentication
>
Signing In
>
Sign-in Pages
>
Users/Administrator Sign-in Pages
. The corresponding workspace appears.
3.
Add or modify settings on the user/administrator sign-in page as specified in Table
57 on page 211.
4.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 57: Users/Administrator Sign-in Pages Configuration Details
Your Action
Function
Option
Settings tab
Enter a name for the user or
administrator sign-in page.
Specifies the name of the user or
administrator sign-in page.
Name
Select any sign-in page type such as
Standard
or
Custom Sign-In Pages
.
Specifies the type of sign-in page.
Sign-in Page Type
Settings > Sign-in Page Type > Standard > Custom Text tab
211
Copyright © 2010, Juniper Networks, Inc.
Chapter 13: Configuring Sign-in Policies and Sign-in Pages
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...