Administrator Guide

ping
Test network connectivity using an ICMP echo request (“ping”).
PKCS#n
Public-key cryptography standard N. Refers to a numbered standard related to topics in cryptography, includ-
ing private keys (PKCS#1), digital certificates (PKCS#7), certificate signing requests (PKCS#10), and secure
storage of keys and certificates (PKCS#12).
PKI
See public-key infrastructure.
Policy Manager
ClearPass Policy Manager (CPPM) is the main application of the ClearPass access management platform, and
is used to create and enforce policies across a network for all devices and applications. CPPM also includes
links to Guest, Insight, and Onboard. OnGuard and Profile features and some AirGroup configuration items
are included within the Policy Manager user interface.
POST
HTTP request method that requests date from a specified resource.
posture
Set of characteristics describing the health of an endpoint device seeking access to the network. These may
include such things as device type, operating system, or antivirus software. Posture assessment or posture
validation: Using rules to evaluate and provide a security assessment for the endpoint and its user, assuring
they are compliant. Posture token: Health status of the endpoint.
posture policy
Internal posture policies test requests against internal posture rules to assess health. Posture rule conditions
can contain attributes present in vendor-specific posture dictionaries.
posture server
Evaluates client health based on specified vendor-specific posture credentials, typically posture credentials
that cannot be evaluated internally by Policy Manager (that is, not by internal posture policies). Currently,
Policy Manager supports two forms of posture server interfaces: RADIUS posture servers and GAMEv2 pos-
ture servers.
Pre-Shared Key
See PSK.
print template
Defines the format and appearance of a guest account receipt.
private key
The part of a public/private key pair that is always kept private. The private key is used to encrypt a message’s
signature to authenticate the sender (only the sender knows the private key). The private key is also used to
decrypt a message that was encrypted with the sender’s public key (only the sender can decrypt it). See also
public key.
Dell Networking W-ClearPass Guest 6.5.0 | User Guide Glossary | 637