Idm configuration process overview, Idm usage strategies, Idm configuration process overview -6 – HP Identity Driven Manager Software Series User Manual

Page 26: Idm usage strategies -6

Advertising
background image

2-6

Getting Started
Before You Begin

IDM Configuration Process Overview

To configure IDM to provide access control on your network, first let IDM run
long enough to "discover" the Realms, RADIUS servers, and users on your
network. Once IDM has performed these tasks for you, your configuration
process would be as follows:

1.

If you intend to use them, define "locations" from which users will access
the network. A location may relate to port-based VLANS, or to all ports
on a device. (See page 3-7)

2.

If you intend to use them, define "times" at which users are allowed or
denied access. This can be by day, week or even hour. (See page 3-14)

3.

Define any network resources (systems and applications) that you want
to specifically allow or restrict users from accessing.

4.

If you intend to restrict a user access to specific systems, you need to set
the User profile to include the MAC address for each system that the user
is allowed to login on. (See page 3-57.)

5.

Create the Access Profiles, to set the VLAN, QoS, rate-limits (bandwidth)
attributes, and the network resources that are available, to users in an
Access Policy Group. (See page 3-24.)

6.

Create an Access Policy Group, with rules containing the Location, Time,
System, and Access Profile that is applied to users when they login. (See
page 3-34.)

OR

If using Active Directory synchronization, add rules and Access Profiles
to the Access Policy Groups automatically created by Active Directory
synchronization.

7.

If Active Directory synchronization is not used, assign Users to the
appropriate Access Policy Group. (See page 3-41).

8.

If automatic deployment is disabled, deploy the configuration policies to
the IDM Agent on the RADIUS server. (See page 3-46)

IDM Usage Strategies

You can use IDM to simply monitor user activity on the network, or to apply
user authentication rules to improve network security and performance. The
following table identifies the IDM configuration for various deployment and
usage strategies for IDM.

Advertising
This manual is related to the following products: