Users Guide

Third-Party Security and ITSystems
W-ClearPass can be extended to third-party security and IT systems using REST-based APIs to automate work
flows that previously required manual IT intervention. W-ClearPass integrates with mobile device management
to leverage device inventory and posture information, which enables well-informed policy decisions.
Key Features
W-ClearPass's key features are as follows:
l Bring Your Own Device (BYOD) Certificate Authority for secure self service onboarding
l Auto Sign-On and single sign-on (SSO) support via Security Assertion Markup Language (SAML) v2.0
l Social network and Cloud application SSO via OAuth2, Facebook, Twitter, LinkdIn, Office365, Google Apps,
and so on
l Enterprise reporting, monitoring, and alerting
l Role-based network access enforcement for multivendor Wi-Fi, wired, and VPN networks
l High performance, scalability, High Availability, and load balancing
l A Web-based user interface that simplifies policy configuration and troubleshooting
l Network Access Control (NAC), Network Access Protection (NAP) posture and health checks, and Mobile
Device Management (MDM) integration for mobile device posture checks
l Advanced reporting of all user authentications and failures
l HTTP/RESTful APIs for integration with third-party systems, Internet security, and MDM
l Device profiling and self-service onboarding
l Guest access with extensive branding and customization and sponsor-based approvals
l IPv6 administration support
Advanced Policy Management
W-ClearPass advanced policy management support includes:
l Employee access
W-ClearPass offers user and device authentication based on 802.1X, non-802.1X, and Web Portal access
methods. To strengthen security in any environment, you can concurrently use multiple authentication
protocols, such as PEAP, EAP-FAST, EAP-TLS, EAP-TTLS, and EAP-PEAP-Public.
For fine-grained control, you can use attributes from multiple identity stores, such as Microsoft Active
Directory, LDAP-compliant directory, Open Database Connectivity (ODBC)-compliant SQL database, token
servers, and internal databases across domains within a single policy.
Additionally, you can add posture assessments and remediation to existing policies at any time.
l Device profiling
W-ClearPass provides a profiling service that discovers and classifies all endpoints, regardless of device type.
You can obtain a variety of contextual data(such as MAC OUIs, DHCP fingerprinting, and other identity-
centric device data) and use this data within policies.
Stored profiling data identifies device profile changes and dynamically modifies authorization privileges. For
example, if a printer appears as a Windows laptop, W-ClearPass Policy Manager can automatically deny
access.
l Access for unmanaged endpoints
Unmanaged non-802.1X devices (such as printers, IP phones, and IP cameras) can be identified as known or
unknown upon connecting to the network. The identity of these devices is based on the presence of their
MAC address in an external or internal database.
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide About W-ClearPass Policy Manager | 23