Users Guide

Figure 203: Existing Static Host List Added
Only static host lists of type MAC Address Host Lists or MAC Address Regular Expression can be configured as
authentication sources.
a. To remove the selected static host list, click Remove.
b. To view the contents of the selected static host list, click View Details.
c. To modify the selected static host list, click Modify.
7. Click Save.
Token Server
Policy Manager can perform GTC authentication against any token server than can authenticate users by acting
as a RADIUS server (for example, RSA SecurID Token Server) and can authenticate users against a token server
and fetch role mapping attributes from any other configured authorization source.
Pair this source type with an authorization source (identity store) containing user records. When using a token
server as an authentication source, use the administrative interface to optionally configure a separate
authorization server. Policy Manager can also use the RADIUS attributes returned from a token server to create
role mapping policies. For more information, see Namespaces on page 919.
You configure primary and backup servers, session details, and the filter query and role mapping attributes to
fetch for token server authentication sources on the following tabs:
l General Tab on page 246
l Primary Tab on page 247
l Attributes Tab on page 247
l Summary Tab on page 248
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Authentication Methods and Sources | 245