If not sure what is Juniper UAC Products, Here is the URL for review
http://www.juniper.net/us/en/products-services/security/uac/ic4500/

Actually there is similar Juniper Secure Access / SSL vpn product introduced before here.
Just recently configured an IC4500 to implementation access control. Here is some steps to share out. Hopefully it can save some others time for their task.

1. Log into system

System.png?resize=400%2C228&ssl=1System.png?resize=400%2C228&ssl=1

2. Upgrade Package 

Upgrade it to latest version 4.2.R1 build 19091. It can be done from Maintenance->System-> Upgrade/Downgrade:

Upgrade.png?resize=400%2C342&ssl=1Upgrade.png?resize=400%2C342&ssl=1

3. Set up Internal Port network info while others can keep default settings.

Network.png?resize=400%2C243&ssl=1Network.png?resize=400%2C243&ssl=1

4. Licensing

License.png?resize=400%2C298&ssl=1License.png?resize=400%2C298&ssl=1

5. Add a new Infranet Enforcer

Infranet+Enforcer+Connection.png?resize=400%2C217&ssl=1Infranet+Enforcer+Connection.png?resize=400%2C217&ssl=1

6. Configure SRX to interact with IC4500

[email protected]> show configuration services
unified-access-control {
    infranet-controller ic4500 {
        address 10.9.0.6;
        interface reth0.2;
        password “$9$f5F/CA0hSeO1eWx7sn/9A1R”; ## SECRET-DATA
    }
    inactive: test-only-mode;
}

Note: Updated on Oct 25 2012, Interface reth5.200 can not be in any routing instance except the main one.  By the way, you also can use fxp interface to do connection with UAC device (Updated Feb 24 2016)

{primary:node1}
[email protected]> show services unified-access-control status    
node1:
————————————————————————–
Host           Address         Port   Interface     State
ic4500         10.9.0.6      11123   fxp0.0        connected

7. Create new Users Realms

UserRealm.png?resize=400%2C276&ssl=1UserRealm.png?resize=400%2C276&ssl=1

8 Create new User Role

UserRole.png?resize=400%2C261&ssl=1UserRole.png?resize=400%2C261&ssl=1

9. Enable Agentless Access and Disable Agent Odyssey Access

In this case, only agentless method used.

Agentless.png?resize=400%2C213&ssl=1Agentless.png?resize=400%2C213&ssl=1

10. Create User Sign in Page

usersignin.png?resize=393%2C400&ssl=1usersignin.png?resize=393%2C400&ssl=1


11. Create user in the Users tab under Auth. Servers menu

user.png?resize=400%2C176&ssl=1user.png?resize=400%2C176&ssl=1

12. Access Authentication Page

At this moment, all basic setup has been finished. User created, and can be authenticated by accessing url https://10.9.2.14/users webpage.

13. Grant User to Access Resources

Last step is to tell how UAC going to grant access to resource. Go to Infranet Enforcer ->Resource tab, click button New Policy to create one:

Resource.png?resize=400%2C295&ssl=1Resource.png?resize=400%2C295&ssl=1

14. Done, testing

login+page.png?resize=400%2C181&ssl=1login+page.png?resize=400%2C181&ssl=1
Reference: