Pulse Policy Secure - Juniper Networks Policy Secure Enterprise Guest User Access Manager Feature Guide ... SMS Gateway Settings for Guest User Accounts ... appliance

  • View
    212

  • Download
    0

Embed Size (px)

Text of Pulse Policy Secure - Juniper Networks Policy Secure Enterprise Guest User Access Manager Feature...

  • 2014 by Pulse Secure, LLC. All rights reserved

    Pulse Policy Secure

    Enterprise Guest User Access Manager Feature

    Guide

    Product Release 5.1

    Document Revision 1.0 Published: 2014-12-15

  • 2014 by Pulse Secure, LLC. All rights reserved

    Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 http://www.pulsesecure.net

    2014 by Pulse Secure, LLC. All rights reserved

    Pulse Secure and the Pulse Secure logo are trademarks of Pulse Secure, LLC in the United States. All other trademarks, service marks, registered

    trademarks, or registered service marks are the property of their respective owners.

    Pulse Secure, LLC assumes no responsibility for any inaccuracies in this document. Pulse Secure, LLC reserves the right to change, modify, transfer,

    or otherwise revise this publication without notice. Pulse Policy Secure Enterprise Guest User Access Manager Feature Guide

    The information in this document is current as of the date on the title page.

    END USER LICENSE AGREEMENT

    The Pulse Secure product that is the subject of this technical documentation consists of (or is intended for use with) Pulse Secure software. Use of

    such software is subject to the terms and conditions of the End User License Agreement (EULA) posted at http://www.pulsesecure.net/support/eula.

    By downloading, installing or using such software, you agree to the terms and conditions of that EULA.

    Revision History

    2014-12-15 Changes for rebranding

    http://www.pulsesecure.net/http://www.pulsesecure.net/support/eula

  • 2014 by Pulse Secure, LLC. All rights reserved i

    Table of Contents

    About the Documentation ............................................................................................. ix

    Documentation and Release Notes ................................................................................ ix

    Supported Platforms ......................................................................................................... ix

    Documentation Conventions ....................................................................................... ix

    Requesting Technical Support ................................................................................... xii

    Self-Help Online Tools and Resources ................................................................ xii

    Opening a Case with PSGSC ............................................................................................ xii

    Part 1 Overview

    Chapter 1 Enterprise Guest Access ............................................................................................................. 3

    Enterprise Guest Access Overview .................................................................................... 3

    Chapter 2 Guest Access Mode..................................................................................................5

    Guest Access Mode Overview ............................................................................................. 5

    Chapter 3 Deployments .................................................................................................................. 7

    Guest Access Mode Deployment Overview ....................................................................... 7

    Layer 2 Bridge Enforcer Deployment Overview ........................................................ 7

    Layer 2 Bridge Interface Configuration ............................................................................ 9

    Layer 2 Bridge Administration ............................................................................................ 9

    Understanding Guest Access Mode Cluster Deployments ............................................... 10

    Part 2 Configuration

    Chapter 4 Guest User Access Management Framework ......................................................... 13

    Using Task Guidance ................................................................................................................... 13

    Configuring the Guest User Access Management Framework........................................ 14

    Before You Begin ......................................................................................................... 15

    Configuring the Local Authentication Server ............................................................... 15

    Configuring a Role for Guest User Account Managers .............................................. 17

    Configuring a Role for Guest Users ............................................................................... 21

    Configuring a Guest Realm .............................................................................................. 25

    Configuring Role Mapping Rules ................................................................................... 26

    Configuring a Sign-In Policy for Guests ....................................................................... 27

    Configuring Resource Access Policies for Guests ..................................................... 28

  • iv 2014 by Pulse Secure, LLC. All rights reserved

    Enterprise Guest User Access Manager Feature Guide

    Configuring a Guest User Account Manager Account .............................................. 31

    Customizing the Guest User Account Manager Pages ........................................................ 32

    Guest User Account Manager Pages Overview ...................................................... 32

    Customizing the Guest User Account Manager Home Page ..................................... 35

    Downloading the Sample Template Files ............................................................... 38

    Modifying the Sample Template Files ........................................................................... 39

    Uploading Your Customized Files ................................................................................... 44

    Using the Customized Pages ............................................................................................... 46

    Verifying the Customization ...................................................................................... 48

    SMS Gateway Settings for Guest User Accounts ................................................................ 49

    Part 3 Administration

    Chapter 5 Guest User Account Managers ................................................................................ 55

    Creating Temporary Guest User Accounts .......................................................................... 55

  • 2014 by Pulse Secure, LLC. All rights reserved v

    List of Figures

    Part 1 Overview

    Chapter 3 Deployments .................................................................................................................. 7

    Figure 1: Layer 2 Bridge Deployment ........................................................................................ 8

    Part 2 Configuration

    Chapter 4 Guest User Access Management Framework .......................................................... 13

    Figure 2: Task Guidance ............................................................................................................ 14

    Figure 3: Guest User Auth Server .................................................................................................. 16

    Figure 4: GUAM User Role Configuration ............................................................................ 18

    Figure 5: Guest User Role Configuration ............................................................................. 22

    Figure 6: Guest Access User Realm ..................................................................................... 26

    Figure 7: Example Role Mapping Rules .......................................................................................27

    Figure 8: Sign-in Policy ............................................................................................................. 28

    Figure 9: Resource Access Policy Allow All ................................................................. 29

    Figure 10: Resource Access Policy Deny ......................................................................... 30

    Figure 11: GUAM User Account ........................................................................................................ 31

    Figure 12: GUAM Home Page .............................................................................................................. 32

    Figure 13: New Local User Page.......................................................................................................... 33

    Figure 14: Create Many Page ............................................................................................................... 33

    Figure 15: Update Local User Page ................................................................................................... 34

    Figure 16: Print Details Page .................................................................................................................. 35

    Figure 17: GUAM Role ...................................................................................................................... 36

    Figure 18: GUAM page .................................................................................................................... 38

    Figure 19: Custom Sign-in Page ........................................................................................................... 39

    Figure 20: Adm