Dell Powerconnect W-ClearPass Hardware Appliances W-ClearPass Policy Manager 6 - Page 127

CHAP and EAP-MD5, Adding and Modifying Authentication Sources

Page 127 highlights

Parameter Description not in a configured authentication source. This setting is enabled, for example, when you want Policy Manager to trigger an audit for an unknown client. By turning on this check box and enabling audit (See "Configuring Audit Servers" on page 204), you can trigger an audit of an unknown client. CHAP and EAP-MD5 In addition the methods listed above, Policy Manager also comes packaged with CHAP and EAP-MD5 methods. These are named [CHAP] and [EAP-MD5], respectively. You can add methods of this type with a custom name. These methods can also be associated to a Service as authentication methods. Adding and Modifying Authentication Sources Policy Manager supports the following Authentication Sources: Table 57: Policy Manager Supported Authentication Sources Source Description Special Considerations Active Directory Policy Manager can perform NTLM/MSCHAPv2, PAP/GTC and certificate-based authentications against Microsoft Active Directory. Retrieve role mapping attributes by using filters. See "Adding and Modifying Role Mapping Policies " on page 155 LDAP compliant directory service Policy Manager can perform MSCHAPv2 and PAP/GTC authentication against any LDAP-compliant directory (for example, Novell eDirectory, OpenLDAP, or Sun Directory Server). Retrieve role mapping attributes by using filters.. Kerberos service Policy Manager can perform standard PAP/GTC or tunneled PAP/GTC (for example, EAP-PEAP[EAP-GTC]) authentication against any Kerberos 5 compliant server such as the Microsoft Active Directory server. It is mandatory to pair this Source type with an authorization source (identity store) containing user records. Open Data Base Connectivity (ODBC) compliant SQL databases Policy Manager can perform MSCHAPv2 and PAP/GTC authentication against any ODBC-compliant database (for example, Microsoft SQL Server, Oracle, MySQL, or PostgrSQL). Specify a stored procedure to query the relevant tables. Retrieve role mapping attributes by using filters. Token Servers (for example, RSA SecurID) Policy Manager can perform GTC authentication against any token server than can authenticate users by acting as a RADIUS server (e.g., RSA SecurID Token Server). Policy Manager can authenticate users against a token server and fetch role mapping attributes from any other configured Authorization Source. Pair this Source type with an authorization source (identity store) containing user records. When using a token server as an authentication source, use the administrative interface to optionally configure a separate authorization server. Dell Networking W-ClearPass Policy Manager 6.0 | User Guide 127

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372

Parameter
Description
not in a configured authentication source. This setting is enabled, for example, when you want
Policy Manager to trigger an audit for an unknown client. By turning on this check box and
enabling audit (See
"Configuring Audit Servers" on page 204
), you can trigger an audit of an
unknown client.
CHAP and EAP-MD5
In addition the methods listed above, Policy Manager also comes packaged with CHAP and EAP-MD5 methods.
These are named [CHAP] and [EAP-MD5], respectively. You can add methods of this type with a custom name.
These methods can also be associated to a
Service
as authentication methods.
Adding and Modifying Authentication Sources
Policy Manager supports the following Authentication Sources:
Table 57:
Policy Manager Supported Authentication Sources
Source
Description
Special Considerations
Active
Directory
Policy Manager can perform NTLM/MSCHAPv2, PAP/GTC and
certificate-based authentications against Microsoft Active Directory.
Retrieve role mapping
attributes by using filters.
See
"Adding and
Modifying Role Mapping
Policies " on page 155
LDAP
compliant
directory
service
Policy Manager can perform MSCHAPv2 and PAP/GTC
authentication against any LDAP-compliant directory (for example,
Novell eDirectory, OpenLDAP, or Sun Directory Server).
Retrieve role mapping
attributes by using filters..
Kerberos
service
Policy Manager can perform standard PAP/GTC or tunneled
PAP/GTC (for example, EAP-PEAP[EAP-GTC]) authentication against
any Kerberos 5 compliant server such as the Microsoft Active
Directory server.
It is mandatory to pair this
Source type with an
authorization source
(identity store) containing
user records.
Open Data
Base
Connectivity
(ODBC)
compliant
SQL
databases
Policy Manager can perform MSCHAPv2 and PAP/GTC
authentication against any ODBC-compliant database (for example,
Microsoft SQL Server, Oracle, MySQL, or PostgrSQL).
Specify a stored procedure
to query the relevant tables.
Retrieve role mapping
attributes by using filters.
Token
Servers (for
example,
RSA
SecurID)
Policy Manager can perform GTC authentication against any token
server than can authenticate users by acting as a RADIUS server
(e.g., RSA SecurID Token Server).
Policy Manager can authenticate users against a token server and
fetch role mapping attributes from any other configured
Authorization Source.
Pair this Source type with
an authorization source
(identity store) containing
user records.
When using a token server
as an authentication
source, use the
administrative interface to
optionally configure a
separate authorization
server.
Dell Networking W-ClearPass Policy Manager 6.0 | User Guide
127