Administrator Guide

Table Of Contents
l RADIUS Enforcement profiles: All RADIUS namespace attributes that can be sent back to a RADIUS client
(the ones marked with the OUT or INOUT qualifier)
l Role mapping policies
l Service rules: All RADIUS namespace attributes that can appear in a request (the ones marked with the IN or
INOUT qualifier)
TACACS Namespaces
The TACACS (Terminal Access Controller Access-Control System) namespace has the attributes associated with
attributes available in a TACACS+ request. Available attributes are:
l AuthSource
l AvendaAVPair
l UserName
Tips Namespaces
The pre-defined attributes for the Tips namespace are Role and Posture. Values are assigned to these attributes
at run-time after Policy Manager evaluates role mapping and posture related policies.
Role
The value for the Role attribute is a set of roles assigned by either the role mapping policy or the post-audit
policy. The value of the Role attribute can also be a dynamically fetched Enable as role attribute from the
authorization source. The posture value is computed after Policy Manager evaluates internal posture policies,
and gets posture status from posture servers or audit servers.
Posture
The value for the Posture attribute is one of the following:
l CHECKUP
l HEALTHY
l INFECTED
l QUARANTINE
l TRANSITION
l UNKNOWN
Tips Namespace Editing Context
Enforcement policies
Variables
Variables are populated with the connection-specific values. Variable names (prefixed with % and enclosed in
curly braces; for example, %{Username}”) can be used in filters, role mapping, enforcement rules, and
enforcement profiles.
W-Policy Manager does in-place substitution of the value of the variable during run-time rule evaluation.
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Rules Editing and Namespaces | 855