Dell PowerConnect W Clearpass 100 Software 3.7 Deployment Guide - Page 101

About Authorization Methods in External Authentication Servers

Page 101 highlights

 If the authentication is successful, the authorization code is evaluated. The user object returned from the external authentication server is available as the variable $user.  The PHP code should return one of the following values:  The ID of a user role (that is, an integer value) to assign that role to the external user.  NULL to indicate no role (that is, authentication only).  FALSE or a standard result type such as array('error' => 1, 'message' => 'description of failure') to indicate an authorization failure  Authorization of the user then continues using the specified role ID. The RADIUS server will return an Access-Reject message if the authorization fails.  The RADIUS server will return an Access-Accept message that includes the corresponding attributes from the user role if the authentication and authorization steps are both successful. Click the Save Changes button to complete the creation or modification of the external authentication server. You will be prompted to restart the RADIUS server after making configuration changes affecting external authentication. About Authorization Methods in External Authentication Servers The level of authorized access an authenticated user can have is controlled by the external authentication server's authorization method. There are two aspects to user authorization:  Is the user allowed? Yes/no decisions can be made in the context of authorization. Examples: user account not enabled; user account expired; user account exceeded a traffic quota within a certain time window.  What are the user's permitted limits? These are not yes/no decisions, but might involve a calculation based on previous usage (for example, via the accounting-based authorization functions), or based on properties of a user account (for example, maximum session lifetime is based on the expiration time for the account) Each server's authorization method can be configured. The authorization methods available vary according to the type of authentication server:  No authorization - Authenticate only may be used to provide a basic user authentication service. The RADIUS server will respond with an Access-Accept or Access-Reject for the authentication attempt. Only RADIUS attributes directly related to user authentication will be returned; all other attributes will be ignored.  Use role assigned to local user is the only authorization method available for the local user database. If the user's authentication attempt is successful, the RADIUS server will respond with an Access-Accept message that includes the RADIUS attributes defined for the user's role.  Use the common name of the client certificate to match a local user account may be specified for users authenticated via EAP-TLS on a client's local certificate server.  Use attributes from Proxy RADIUS server is an authorization method available only for Proxy RADIUS servers. The RADIUS attributes returned by the external RADIUS server are returned unmodified.  Assign a fixed user role may be used to assign all authenticated users to a particular user role. If the user's authentication attempt is successful, the RADIUS server will respond with an Access-Accept message that includes the RADIUS attributes defined for the fixed role that has been selected for this authentication server. Amigopod 3.7 | Deployment Guide RADIUS Services | 101

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438

Amigopod 3.7
|
Deployment Guide
RADIUS Services
|
101
If the authentication is successful, the authorization code is evaluated.
The user object returned
from the external authentication server is available as the variable
$user
.
The PHP code should return one of the following values:
The ID of a user role (that is, an integer value) to assign that role to the external user.
NULL to indicate no role (that is, authentication only).
FALSE or a standard result type such as
array('error' => 1, 'message' =>
'description of failure')
to indicate an authorization failure
Authorization of the user then continues using the specified role ID.
The RADIUS server will return
an Access-Reject message if the authorization fails.
The RADIUS server will return an Access-Accept message that includes the corresponding attributes
from the user role if the authentication and authorization steps are both successful.
Click the
Save Changes
button to complete the creation or modification of the external authentication
server.
About Authorization Methods in External Authentication Servers
The level of authorized access an authenticated user can have is controlled by the external authentication
server’s authorization method.
There are two aspects to user authorization:
Is the user allowed? Yes/no decisions can be made in the context of authorization.
Examples: user
account not enabled; user account expired; user account exceeded a traffic quota within a certain time
window.
What are the user’s permitted limits?
These are not yes/no decisions, but might involve a calculation
based on previous usage (for example, via the accounting-based authorization functions), or based on
properties of a user account (for example, maximum session lifetime is based on the expiration time for
the account)
Each server’s authorization method can be configured. The authorization methods available vary according
to the type of authentication server:
No authorization — Authenticate only
may be used to provide a basic user authentication service.
The RADIUS server will respond with an Access-Accept or Access-Reject for the authentication attempt.
Only RADIUS attributes directly related to user authentication will be returned; all other attributes will
be ignored.
Use role assigned to local user
is the only authorization method available for the local user database.
If the user’s authentication attempt is successful, the RADIUS server will respond with an Access-Accept
message that includes the RADIUS attributes defined for the user’s role.
Use the common name of the client certificate to match a local user account
may be specified
for users authenticated via EAP-TLS on a client’s local certificate server.
Use attributes from Proxy RADIUS server
is an authorization method available only for Proxy
RADIUS servers. The RADIUS attributes returned by the external RADIUS server are returned
unmodified.
Assign a fixed user role
may be used to assign all authenticated users to a particular user role. If the
user’s authentication attempt is successful, the RADIUS server will respond with an Access-Accept
message that includes the RADIUS attributes defined for the fixed role that has been selected for this
authentication server.
You will be prompted to restart the RADIUS server after making configuration changes affecting external
authentication.