It is tempting to create the roles and then the policies, but if you create the rles, then use resource policies it is more likely to lead to missing smething. Use resource profiles and all the configurations pages are linked s you don't have to go find them individualy. With one or two exceptions. Basically, you need all your users(names/groups- works with AD groups) the resources you are allowing them to access and how you allow that access. Do I eed to give them full network access or just enough to get the job done? Roles - Sales, Employees, Guests, Accounting, etc Authentication Server Define different Authetication servers - AD, Local (on the MAG system), RADIUS, 2FA,(Numerous options) Authentication Realm - Users realm Role Mapping Rules and Restrictions -Map users by name, group (lots of otions) Sign-In Policy - Determine Users authentication realm, sign-in page etc Resource Policies - This is your ACL to specific resources. For example, you allow web access this allow/deny/detailed rules. Good resources http://www.juniper.net/techpubs/en_US/uac4.4/topics/concept/security-access-device-access-management-framework-understanding.html http://www.juniper.net/techpubs/en_US/sa8.0/information-products/pathway-pages/sa-series/sa-service-access-mgmt-framework.pdf You can download and test the DTE. Has practicaly all the features of the MAG (with a few minor restrictions) If you are touching the MAG for the first time, I suggest taking the JPSA course first. The thing ca be overwhelming.
... View more