3-35
Using Identity Driven Manager
Defining Access Policy Groups
Using IDM with Endpoint Integrity Systems
You can create access profiles in IDM to work in conjunction with endpoint
integrity (host integrity) applications to verify that systems attempting to
connect to the network meet security requirements. To use the Endpoint
Integrity support options you need to select the Endpoint Integrity option in
the IDM Preferences window (
Tools->Preferences->Identity Management
).
With the Endpoint Integrity preference set, the
Endpoint Integrity
option will
appear in the
Access Rules
windows.
•
Select
PASS
to apply the access rule in cases where the system the
user is logged in on passes the endpoint integrity check.
•
Select
FAIL
to apply the access rule in cases where the system the user
is logged in on fails the endpoint integrity check.
•
Select
ANY
to apply the access rule regardless of the status passed
from the endpoint integrity system.
For example, if you want to restrict access to a specific (remediation) VLAN
when the endpoint integrity check fails, create a Location that specifies the
remediation VLAN, then create an access rule that will put the user on that
Location if the Host Integrity value is
FAIL
.
Содержание J4813A
Страница 1: ...ProCurve Identity Driven Manager User s Guide Software Release 2 0 ...
Страница 20: ...1 16 About ProCurve Identity Driven Manager ProCurve Support ...
Страница 69: ...3 15 Using Identity Driven Manager Configuring Times ...
Страница 124: ...3 70 Using Identity Driven Manager Using the User Import Wizard ...
Страница 140: ...A 6 IDM Technical Reference Types of User Events This page is intentionally unused ...
Страница 144: ......