Dell PowerConnect W Clearpass 100 Software 3.9 Deployment Guide - Page 497

Setting, Description, Table 63

Page 497 highlights

Table 63 LDAP Module Settings (Continued) Setting Description ldap.tls_certfile = not set ldap.tls_randfile = not set ldap.tls_require_cert = not set ldap.default_profile = not set ldap.profile_attribute = not set ldap.access_attrused_for_allow = yes ldap.access_attr = dialupAccess ldap.password_header = not set ldap.password_attribute = not set ldap.groupname_attribute = not set ldap.compare_check_items = no ldap.do_xlat = yes The PEM Encoded certificate file that should be presented to clients that connect. ldap.tls_keyfile = not set The PEM Encoded private key that should be used to encrypt the session. A file containing random data to seed the OpenSSL PRNG. Not needed if your OpenSSL is already properly random. Certificate Verification requirements. Can be "never" (don't even bother trying), "allow" (try, but don't fail if the certificate can't be verified), or "demand" (fail if the certificate doesn't verify). DN of a LDAP object, which contains default RADIUS attributes. If not set, use only user specific attributes or attributes, supplied by other modules. Name of a user object attribute, which contains DN of radiusProfile object for this user. If unset, use only user specific attributes or attributes, supplied by other modules. Determines if the access attribute (described below) will be used to allow access (meaning if it exists then user remote access will be allowed) or to deny access. If attribute is specified, the LDAP module checks for its existence in the user object. If access_attr_used_for_allow is set to yes, and the attribute exists, the user is allowed to get remote access. If the attribute exists and is set to FALSE, the user is denied remote access. If the attribute does not exist, the user is denied remote access by default. If access_attr_used_for_allow is set to no, and the attribute exists, the user is denied remote access. If it does not exist, the user is allowed remote access. If the user password is available we add it to the check items (to assist in CHAP), stripping any headers first. The password_header directive is NOT case insensitive. Define the attribute which contains the user password. The attribute containing group name in the LDAP server. It is used to search groups by name. Specifies if the module will do a comparison on the check items extracted from the ldap with the corresponding items present in the incoming request. Specifies if the module will do an xlat on the radius attributes extracted from the ldap database. Also, the attribute operators will be honored. If the directive is set to 'no' then we will fall back to the pairadd() function which will just add the attributes at the end of the corresponding attribute list (check or reply items). This can be used to fall back to 0.8.1 behavior without changing the LDAP data or to gain a little performance if the LDAP data is rather simple (no special operators) ClearPass Guest 3.9 | Deployment Guide Reference | 497

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518

ClearPass Guest 3.9
|
Deployment Guide
Reference |
497
ldap.tls_certfile
=
not set
The PEM Encoded certificate file that should be presented to
clients that connect.
ldap.tls_keyfile =
not set
The PEM Encoded private key that should be used to encrypt the
session.
ldap.tls_randfile
=
not set
A file containing random data to seed the OpenSSL PRNG. Not
needed if your OpenSSL is already properly random.
ldap.tls_require_cert
=
not set
Certificate Verification requirements. Can be “never” (don’t even
bother trying), “allow” (try, but don’t fail if the certificate can't be
verified), or “demand” (fail if the certificate doesn’t verify).
ldap.default_profile
=
not set
DN of a LDAP object, which contains default RADIUS attributes. If
not set, use only user specific attributes or attributes, supplied by
other modules.
ldap.profile_attribute
=
not set
Name of a user object attribute, which contains DN of radiusProfile
object for this user. If unset, use only user specific attributes or
attributes, supplied by other modules.
ldap.access_attrused_for_allow
= yes
Determines if the access attribute (described below) will be used to
allow access (meaning if it exists then user remote access will be
allowed) or to deny access.
ldap.access_attr
= dialupAccess
If attribute is specified, the LDAP module checks for its existence
in the user object. If access_attr_used_for_allow is set to yes, and
the attribute exists, the user is allowed to get remote access.
If the attribute exists and is set to FALSE, the user is denied remote
access. If the attribute does not exist, the user is denied remote
access by default.
If access_attr_used_for_allow is set to no, and the attribute exists,
the user is denied remote access. If it does not exist, the user is
allowed remote access.
ldap.password_header
=
not set
If the user password is available we add it to the check items (to
assist in CHAP), stripping any headers first. The password_header
directive is NOT case insensitive.
ldap.password_attribute
=
not set
Define the attribute which contains the user password.
ldap.groupname_attribute
=
not set
The attribute containing group name in the LDAP server. It is used
to search groups by name.
ldap.compare_check_items
= no
Specifies if the module will do a comparison on the check items
extracted from the ldap with the corresponding items present in
the incoming request.
ldap.do_xlat
= yes
Specifies if the module will do an xlat on the radius attributes
extracted from the ldap database. Also, the attribute operators will
be honored. If the directive is set to ‘no’ then we will fall back to
the pairadd() function which will just add the attributes at the end
of the corresponding attribute list (check or reply items). This can
be used to fall back to 0.8.1 behavior without changing the LDAP
data or to gain a little performance if the LDAP data is rather
simple (no special operators)
Table 63
LDAP Module Settings (Continued)
Setting
Description