Dell Powerconnect W-ClearPass Hardware Appliances W-ClearPass Policy Manager 6 - Page 343

Table 219, LDAP Instance Namespace, Sources, Date Namespace, Connection Namespace

Page 343 highlights

Active Directory, you need to define filters for that authentication source (see "Adding and Modifying Authentication Sources " on page 127 for more information). n LDAP Instance Namespace - For each instance of an LDAP authentication source, there is an LDAP instance namespace that appears in the rules editing interface. The LDAP instance namespace consists of all the attributes that were defined when the authentication source was created. These attribute names are prepopulated in the UI for administrative convenience. For Policy Manager to fetch the values of attributes from an LDAP-compliant directory, you need to define filters for that authentication source (see "Adding and Modifying Authentication Sources " on page 127 for more information). n SQL Instance Namespace - For each instance of an SQL authentication source, there is an SQL instance namespace that appears in the rules editing interface. The SQL instance namespace consists of attributes names that you have defined when you created an instance of this authentication source. The attribute names are pre-poluated for administrative convenience. For Policy Manager to fetch the values of attributes from a SQL-compliant database, you need to define filters for that authentication source. n RSAToken Instance Namespace - For each instance of an RSA Token Server authentication source, there is an RSA Token Server instance namespace that appears in the rules editing interface. The RSA Token Server instance namespace consists of attributes names that you have defined when you created an instance of this authentication source. The attribute names are pre-poluated for administrative convenience. n Sources- This is the list of the authorization sources from which attributes were fetched for role mapping. Authorization namespaces appear in the following editing contexts: n Role mapping policies l Date Namespace - The date namespace has three pre-defined attributes defined: Time-of-Day, Day-of-Week and Date-of-Year. Depending on the attribute selected in the UI, the operator and value fields change. For Day-ofWeek, the operators supported are BELONG_TO and NOT_BELONGS_TO, and the value field shows a multiselect list box with days from Monday through Sunday. The Time-of-Day attribute shows a time widget in the value field. The Date-of-Year attribute shows a date, month and year widget in the value field. The operators supported for Date-of-Year and Time-of-Day attributes are the similar to the ones supported for the integer data type (See section for more details. Date namespace appears in the following editing contexts: n Service rules n Role mapping policies n Enforcement policies n Filter rules for Access Tracker and Activity Reports l Connection Namespace - The connection namespace can be used in role mapping policies to define roles based on where the protocol request originated from and where it terminated. The connection namespace has the following pre-defined attributes: Table 219: Connection Namespace Pre-defined Attributes Attribute Description Src-IP-Address Src-Port Src-IP-Address and Src-Port are the IP address and port from which the request (RADIUS, TACACS+, etc.) originated Dell Networking W-ClearPass Policy Manager 6.0 | User Guide 343

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372

Active Directory, you need to define filters for that authentication source (see
"Adding and Modifying
Authentication Sources " on page 127
for more information).
n
LDAP Instance Namespace
- For each instance of an LDAP authentication source, there is an LDAP instance
namespace that appears in the rules editing interface. The LDAP instance namespace consists of all the
attributes that were defined when the authentication source was created. These attribute names are pre-
populated in the UI for administrative convenience. For Policy Manager to fetch the values of attributes from
an LDAP-compliant directory, you need to define filters for that authentication source (see
"Adding and
Modifying Authentication Sources " on page 127
for more information).
n
SQL Instance Namespace
- For each instance of an SQL authentication source, there is an SQL instance
namespace that appears in the rules editing interface. The SQL instance namespace consists of attributes
names that you have defined when you created an instance of this authentication source. The attribute names
are pre-poluated for administrative convenience. For Policy Manager to fetch the values of attributes from a
SQL-compliant database, you need to define filters for that authentication source.
n
RSAToken Instance Namespace
- For each instance of an RSA Token Server authentication source, there is an
RSA Token Server instance namespace that appears in the rules editing interface. The RSA Token Server
instance namespace consists of attributes names that you have defined when you created an instance of this
authentication source. The attribute names are pre-poluated for administrative convenience.
n
Sources
- This is the list of the authorization sources from which attributes were fetched for role mapping.
Authorization namespaces appear in the following editing contexts:
n
Role mapping policies
l
Date Namespace
- The date namespace has three pre-defined attributes defined: Time-of-Day, Day-of-Week and
Date-of-Year. Depending on the attribute selected in the UI, the operator and value fields change. For Day-of-
Week, the operators supported are BELONG_TO and NOT_BELONGS_TO, and the value field shows a multi-
select list box with days from Monday through Sunday. The Time-of-Day attribute shows a time widget in the
value field. The Date-of-Year attribute shows a date, month and year widget in the value field. The operators
supported for Date-of-Year and Time-of-Day attributes are the similar to the ones supported for the integer data
type (See section for more details.
Date namespace appears in the following editing contexts:
n
Service rules
n
Role mapping policies
n
Enforcement policies
n
Filter rules for Access Tracker and Activity Reports
l
Connection Namespace
- The connection namespace can be used in role mapping policies to define roles based on
where the protocol request originated from and where it terminated. The connection namespace has the following
pre-defined attributes:
Table 219:
Connection Namespace Pre-defined Attributes
Attribute
Description
Src-IP-Address
Src-IP-Address and Src-Port are the IP address and port from which
the request (RADIUS, TACACS+, etc.) originated
Src-Port
Dell Networking W-ClearPass Policy Manager 6.0 | User Guide
343