Users Guide

Table 64:
Static Hosts List (Static Host Lists Tab)
Parameter Description
Host List Select a Static Host List from the drop down and Add to add it to the list.Click on Remove to
remove the selected static host list. Click on View Details to view the contents of the
selected static host list. Click on Modify to modify the selected static host list.
Only Static Host Lists of type MAC Address List or MAC Address Regular Expression can be configured as
authentication sources. Refer to "Adding and Modifying Static Host Lists " on page 147 for more information.
Token Server
Policy Manager can perform GTC authentication against any token server than can authenticate users by acting as a
RADIUS server (e.g., RSA SecurID Token Server) and can authenticate users against a token server and fetch role
mapping attributes from any other configured Authorization Source.
Pair this Source type with an authorization source (identity store) containing user records. When using a token server
as an authentication source, use the administrative interface to optionally configure a separate authorization server.
Policy Manager can also use the RADIUS attributes returned from a token server to create role mapping policies. See
"Namespaces" on page 314.
You configure primary and backup servers, session details, and the filter query and role mapping attributes to fetch for
Token Server authentication sources on the following tabs:
l General Tab
l Primary Tab
l Attributes Tab
General Tab
The General tab labels the authentication source and defines session details, authorization sources, and backup server
details.
Figure 93 Token Server (General Tab)
Dell Networking W-ClearPass Policy Manager 6.2 | User Guide 132