Users Guide

Figure 53: Authentication Components
From the Authentication tab of a service, you can configure three features of authentication:
Table 45:
Authentication Features at the Service Level
Configurable
Component
Configuration Steps
Sequence of
Authentication
Methods
1. Select a
Method
, then select Move Up, Move Down, or Remove.
2. Select View Details to view the details of the selected method.
3. Select Modify to modify the selected authentication method. (This launches a popup with the edit
widgets for the select authentication method.)
n To add a previously configured
Authentication Method
, select from the Select drop down list,
then click Add.
n To configure a new
Method
, click the Add New Authentication Method link. Refer to "Adding
and Modifying Authentication Methods" on page 111for information about Authentication
Methods.
Note that an Authentication Method is only configurable for some service types. Refer to "Policy
Manager Service Types" on page 92 for more information.
Sequence of
Authentication
Sources
1. Select a
Source
, then Move Up, Move Down, or Remove.
2. Select View Details to view the details of the selected authentication source.
3. Select Modify to modify the selected authentication source. (This launches the authentication
source configuration wizard for the selected authentication source.
n To add a previously configured
Authentication Source
, select from the Select drop down list,
then click Add.
n To configure a new
Authentication Source
, click the Add New Authentication Source link.
Refer to "Adding and Modifying Authentication Sources " on page 127 for additional
information about Authentication Sources.
Whether to
standardize the form in
which usernames are
present
Select the Enable to specify a comma-separated list of rules to strip usernames check box to pre-
process the user name (and to remove prefixes and suffixes) before authenticating it to the
authentication source.
Adding and Modifying Authentication Methods
Policy Manager supports specific EAP and non-EAP, tunneled and non-tunneled, methods.
Dell Networking W-ClearPass Policy Manager 6.0 | User Guide 111