Users Guide

180 | Authentication and Authorization Dell Networking W-ClearPass Policy Manager 6.3 |User Guide
Parameter Description
Use for
Authorization
This check box instructs Policy Manager to fetch role mapping attributes (or
authorization attributes) from this authentication source. If a user or device
successfully authenticates against this authentication source, then Policy Manager
also fetches role mapping attributes from the same source (if this setting is enabled).
This check box is enabled by default
Authorization
Sources
You can specify additional sources from which to fetch role mapping attributes.
Select a previously configured authentication source from the drop-down list, and
click Add to add it to the list of authorization sources. Click Remove to remove it from
the list.
If Policy Manager authenticates the user or device from this authentication source,
then it also fetches role mapping attributes from these additional authorization
sources.
NOTE: As described in “Services,” additional authorization sources can be
specified at the Service level. Policy Manager fetches role mapping attributes
regardless of which authentication source the user or device was authenticated
against.
Server Timeout This is the time in seconds that Policy Manager waits before attempting to fail over
from primary to the backup servers (in the order in which they are configured).
Backup Servers
Priority
To add a backup server, click Add Backup. When the Backup 1 tab appears, you can
specify connection details for a backup server (same fields as for primary server,
specified below).
To remove a backup server, select the server name and click Remove. Select Move
Up or Move Down to change the server priority of the backup servers. This is the
order in which Policy Manager attempts to connect to the backup servers.
Table 85:
Token Server General tab Parameters (Continued)
Primary Tab
The Primary Tab defines the settings for the primary server.
Figure 133: Token Server (Primary Tab)