HP J4813A User Manual page 89

User manual
Table of Contents

Advertisement

Using IDM with Endpoint Integrity Systems
You can create access profiles in IDM to work in conjunction with endpoint
integrity (host integrity) applications to verify that systems attempting to
connect to the network meet security requirements. To use the Endpoint
Integrity support options you need to select the Endpoint Integrity option in
the IDM Preferences window (
With the Endpoint Integrity preference set, the
Access Rules
appear in the
Select PASS to apply the access rule in cases where the system the
user is logged in on passes the endpoint integrity check.
Select FAIL to apply the access rule in cases where the system the user
is logged in on fails the endpoint integrity check.
Select ANY to apply the access rule regardless of the status passed
from the endpoint integrity system.
For example, if you want to restrict access to a specific (remediation) VLAN
when the endpoint integrity check fails, create a Location that specifies the
remediation VLAN, then create an access rule that will put the user on that
Location if the Host Integrity value is
Tools->Preferences->Identity Management
Endpoint Integrity
windows.
FAIL
.
Using Identity Driven Manager
Defining Access Policy Groups
).
option will
3-35

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Procurve identity driven manager

Table of Contents