Dell Powerconnect W-ClearPass Virtual Appliances W-ClearPass Policy Manager 6. - Page 51

Component, Service, ratio, Description, Rules. You specify the attributes you want to collect when

Page 51 highlights

Component Service: component ratio Description l any LDAP compliant directory l RSA or other RADIUS-based token servers l SQL database, including the local user store. l Static Host Lists, in the case of MAC-based Authentication of managed devices. CAuthorization Source One or more per Authentication Source and zero or more per service An Authorization Source collects attributes for use in Role Mapping Rules. You specify the attributes you want to collect when you configure the authentication source. Policy Manager supports the following authorization source types: l Microsoft Active Directory l any LDAP compliant directory l RSA or other RADIUS-based token servers l SQL database, including the local user store. C - Role Mapping Policy Zero or one per service Policy Manager evaluates Requests against Role Mapping Policy rules to match Clients to Role(s). All rules are evaluated and Policy Manager may return more than one Role. If no rules match, the request takes the configured Default Role. Some Services (for example, MAC-based Authentication) may handle role mapping differently: l For MAC-based Authentication Services, where role information is not available from an authentication source, an Audit Server can determine role by applying post-audit rules against the client attributes gathered during the audit. D - Internal Posture Policies Zero or more per service An Internal Posture Policy tests Requests against internal Posture rules to assess health. Posture rule conditions can contain attributes present in vendorspecific posture dictionaries. E - Posture Servers Zero or more per service Posture servers evaluate client health based on specified vendor-specific posture credentials, typically posture credentials that cannot be evaluated internally by Policy Manager (that is, not by internal posture policies). Currently, Policy Manager supports two forms of posture server interfaces: RADIUS, and GAMEv2 posture servers. F - Audit Servers Zero or more per service Audit servers evaluate the health of clients that do not have an installed agent, or which cannot respond to Policy Manager interactions. Audit servers typically operate in lieu of authentication methods, authentication sources, internal posture policies and posture server. In addition to returning posture tokens, Audit Servers can contain post-audit rules that map results from the audit into Roles. GEnforcement Policy One per service (mandatory) Policy Manager tests Posture Tokens, Roles, system time and other contextual attributes against Enforcement Policy rules to return one or more matching Enforcement Policy Profiles (that define scope of access for the client). HEnforcement Profile One or more per service Enforcement Policy Profiles contain attributes that define a client's scope of access for the session. Policy Manager returns these Enforcement Profile attributes to the switch. Dell Networking W-ClearPass Policy Manager 6.0 | User Guide 51

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372

Component
Service:
component
ratio
Description
l
any LDAP compliant directory
l
RSA or other RADIUS-based token servers
l
SQL database, including the local user store.
l
Static Host Lists, in the case of MAC-based Authentication of managed
devices.
C-
Authorization
Source
One or more
per
Authentication
Source and
zero or more
per service
An Authorization Source collects attributes for use in Role Mapping
Rules. You specify the attributes you want to collect when you
configure the authentication source. Policy Manager supports the
following authorization source types:
l
Microsoft Active Directory
l
any LDAP compliant directory
l
RSA or other RADIUS-based token servers
l
SQL database, including the local user store.
C-
Role
Mapping
Policy
Zero or one
per service
Policy Manager evaluates Requests against Role Mapping Policy rules to
match Clients to Role(s). All rules are evaluated and Policy Manager may return
more than one Role. If no rules match, the request takes the configured Default
Role.
Some Services (for example,
MAC-based Authentication
) may handle role
mapping differently:
l
For
MAC-based Authentication
Services, where role information is not
available from an authentication source, an Audit Server can determine
role by applying post-audit rules against the client attributes gathered
during the audit.
D-
Internal
Posture
Policies
Zero or more
per service
An Internal Posture Policy tests Requests against internal Posture rules to
assess health. Posture rule conditions can contain attributes present in vendor-
specific posture dictionaries.
E-
Posture
Servers
Zero or more
per service
Posture servers evaluate client health based on specified vendor-specific
posture credentials, typically posture credentials that cannot be evaluated
internally by Policy Manager (that is, not by internal posture policies).
Currently, Policy Manager supports two forms of posture server interfaces:
RADIUS,
and
GAMEv2
posture servers.
F-
Audit
Servers
Zero or more
per service
Audit servers evaluate the health of clients that do not have an installed agent,
or which cannot respond to Policy Manager interactions. Audit servers typically
operate in lieu of authentication methods, authentication sources, internal
posture policies and posture server.
In addition to returning posture tokens, Audit Servers can contain post-audit
rules that map results from the audit into Roles.
G-
Enforcement
Policy
One per
service
(mandatory)
Policy Manager tests Posture Tokens, Roles, system time and other contextual
attributes against Enforcement Policy rules to return one or more matching
Enforcement Policy Profiles (that define scope of access for the client).
H-
Enforcement
Profile
One or more
per service
Enforcement Policy Profiles contain attributes that define a client’s scope of
access for the session. Policy Manager returns these Enforcement Profile
attributes to the switch.
Dell Networking W-ClearPass Policy Manager 6.0 | User Guide
51