Chapter 17: Using Identity Management; Identity Management Software License; Overview - Extreme Networks Ridgeline Guide Manual

Concepts and solutions guide
Hide thumbs Also See for Ridgeline Guide:
Table of Contents

Advertisement

17
Using Identity Management
C H A P T E R
This chapter describes how to use Ridgeline to monitor the logon and network usage of LLDP devices
and users connected to managed switches in your network. This information is obtained using the
ExtremeXOS Identity Management feature.

Identity Management Software License

Your software license determines the level of Identity Management available on Ridgeline. When you
install Ridgeline, your license key enables Identity Management on the ExtremeXOS switches where
users and devices are connected. To enable network user authentication on those switches, you
configure roles, policies, and rules, in Ridgeline.

Overview

Ridgeline's Identity Management is an authentication system that identifies network users and
authorizes them to access devices for specific network services and information. Ridgeline provides
role-based user access control to manage this authentication mechanism.
The Identity Management feature monitors users that connect to ports on a switch. Ridgeline provides
the tools to define users' roles, policies, and rules, the necessary components that set the user apart from
other network users. These roles, policies and rules are the criteria that allow access to the information
and services the user needs. When Ridgeline monitors the network, it identifies the user login and
searches for a match on Active Directory where you have configured match criteria for that user.
Figure 197
illustrates this concept.
Ridgeline Concepts and Solutions Guide
249

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ridgeline 3.0

Table of Contents