Dell Powerconnect W-ClearPass Hardware Appliances W-ClearPass Policy Manager 6 - Page 15

Strip Username Rules, 1X - Con Authorization Navigation and Settings

Page 15 highlights

Navigation Settings [Guest Device Repository] [Local SQL DB] [Endpoints Repository] [Local SQL DB] [Onboard Devices Repository] [Local SQL DB] > [Admin User Repository] [Local SQL DB] > AmigoPod AD [Active Directory> l Add > l Upon completion, Next (to configure Authorization) The following field deserves special mention: n Strip Username Rules: Optionally, check here to pre-process the user name (to remove prefixes and suffixes) before sending it to the authentication source. NOTE: To view detailed setting information for any preconfigured policy component, select the item and click View Details. 3. Configure Authorization. Policy Manager fetches attributes for role mapping policy evaluation from the Authorization Sources. In this use case, the Authentication Source and Authorization Source are one and the same. Table 3: 802.1X - Configure Authorization Navigation and Settings Navigation Settings l Configure Service level authorization source. In this use case there is nothing to configure. Click the Next button. l Upon completion, click Next (to Role Mapping). 4. Apply a Role Mapping Policy Policy Manager tests client identity against role-mapping rules, appending any match (multiple roles acceptable) to the request for use by the Enforcement Policy. In the event of role-mapping failure, Policy Manager assigns a default role. In this Use Case, create the role mapping policy RMP_DEPARTMENT that distinguishes clients by department and the corresponding roles ROLE_ENGINEERING and ROLE_FINANCE, to which it maps: Dell Networking W-ClearPass Policy Manager 6.0 | Quick Start Guide 15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28

Navigation
Settings
[Guest Device Repository] [Local
SQL DB]
[Endpoints Repository] [Local SQL
DB]
[Onboard Devices Repository]
[Local SQL DB] >
[Admin User Repository] [Local
SQL DB] >
AmigoPod AD [Active Directory>
l
Add
>
l
Upon completion,
Next
(to
configure Authorization)
The following field deserves special mention:
n
Strip Username Rules:
Optionally, check here to pre-process the user name (to remove prefixes and suffixes)
before sending it to the authentication source.
NOTE: To view detailed setting information for any preconfigured policy component, select the item and click
View Details
.
3.
Configure Authorization.
Policy Manager fetches attributes for role mapping policy evaluation from the Authorization Sources. In this use
case, the Authentication Source and Authorization Source are one and the same.
Table 3:
802.1X - Configure Authorization Navigation and Settings
Navigation
Settings
l
Configure Service level authorization source.
In this use case there is nothing to configure.
Click the
Next
button.
l
Upon completion, click
Next
(to Role
Mapping).
4.
Apply a Role Mapping Policy
Policy Manager tests client identity against role-mapping rules, appending any match (multiple roles acceptable)
to the request for use by the Enforcement Policy. In the event of role-mapping failure, Policy Manager assigns a
default role.
In this Use Case, create the role mapping policy RMP_DEPARTMENT that distinguishes clients by department
and the corresponding roles ROLE_ENGINEERING and ROLE_FINANCE, to which it maps:
Dell Networking W-ClearPass Policy Manager 6.0 | Quick Start Guide
15