3-35
Using Identity Driven Manager
Defining Access Policy Groups
Using IDM with Endpoint Integrity Systems
You can create access profiles in IDM to work in conjunction with endpoint
integrity (host integrity) applications to verify that systems attempting to
connect to the network meet security requirements. To use the Endpoint
Integrity support options you need to select the Endpoint Integrity option in
the IDM Preferences window (
Tools->Preferences->Identity Management
).
With the Endpoint Integrity preference set, the
Endpoint Integrity
option will
appear in the
Access Rules
windows.
•
Select
PASS
to apply the access rule in cases where the system the
user is logged in on passes the endpoint integrity check.
•
Select
FAIL
to apply the access rule in cases where the system the user
is logged in on fails the endpoint integrity check.
•
Select
ANY
to apply the access rule regardless of the status passed
from the endpoint integrity system.
For example, if you want to restrict access to a specific (remediation) VLAN
when the endpoint integrity check fails, create a Location that specifies the
remediation VLAN, then create an access rule that will put the user on that
Location if the Host Integrity value is
FAIL
.
Summary of Contents for J4813A
Page 1: ...ProCurve Identity Driven Manager User s Guide Software Release 2 0 ...
Page 20: ...1 16 About ProCurve Identity Driven Manager ProCurve Support ...
Page 69: ...3 15 Using Identity Driven Manager Configuring Times ...
Page 124: ...3 70 Using Identity Driven Manager Using the User Import Wizard ...
Page 140: ...A 6 IDM Technical Reference Types of User Events This page is intentionally unused ...
Page 144: ......