Users Guide

Token Server
Policy Manager can perform GTC authentication against any token server than can authenticate users by acting as a
RADIUS server (e.g., RSA SecurID Token Server) and can authenticate users against a token server and fetch role
mapping attributes from any other configured Authorization Source.
Pair this Source type with an authorization source (identity store) containing user records. When using a token server
as an authentication source, use the administrative interface to optionally configure a separate authorization server.
Policy Manager can also use the RADIUS attributes returned from a token server to create role mapping policies. See
"Namespaces" on page 445.
You configure primary and backup servers, session details, and the filter query and role mapping attributes to fetch for
Token Server authentication sources on the following tabs:
l "General Tab" on page 177
l "Primary Tab" on page 178
l "Attributes Tab" on page 179
Click the Summary tab to view configured parameters.
General Tab
The General tab labels the authentication source and defines session details, authorization sources, and backup server
details.
Figure 132: Token Server General tab
Parameter Description
Name/Description Freeform label and description.
Type In this context, Token Server.
Table 85:
Token Server General tab Parameters
Dell Networking W-ClearPass Policy Manager 6.3 | User Guide Authentication and Authorization | 177