802.1X
Access-Accept
Access-Reject
Access-Request
Accounting-Request
Accounting-Response
accounting session time
accounting
authentication
authorization
BYOD
CA
captive portal
certificate authority
common name (CN)
$criteria
CRL
CSV
device provisioning
digital certificate
ClearPass Guest 3.9 | Deployment Guide
Chapter 13
Glossary
IEEE standard for port-based network access control.
Response from RADIUS server indicating successful authentication, and
containing authorization information.
Response from RADIUS server indicating a user is not authorized.
RADIUS packet sent to a RADIUS server requesting authorization.
RADIUS packet type sent to a RADIUS server containing accounting
summary information.
RADIUS packet sent by the RADIUS server to acknowledge receipt of an
Accounting-Request.
Length of time the guest has been using the network.
Process of recording summary information about network access by
users and devices.
Verification of a user's credentials, typically a username and password.
Authorization controls the type of access that an authenticated user is
permitted to have.
Bring your own device. Refers to the trend of personal mobile devices
being used with enterprise network infrastructure.
See Certificate Authority.
Implemented by NAS. Provides access to network only to authorized
users.
Entity in a public key infrastructure system that issues certificates to
clients. A certificate signing request received by the CA is converted into
a certificate when the CA adds a signature that is generated with the
CA's private key. See digital certificate, private key, and public key
infrastructure.
See distinguished name.
Array that consists of one or more criteria on which to perform a data
based search. This array is used for advanced cases where pre-defined
helper functions do not provide required flexibility.
Certificate revocation list. List of revoked certificates maintained by a
certificate authority and regularly updated.
Comma-separated values.
Process of preparing a device for use on an enterprise network, by
creating the appropriate access credentials and setting up the network
connection parameters.
Contains identification data (see distinguished name) and the public
key portion of a public/private key pair, and a signature that is generated
by a certificate authority. The signature ensures the integrity of the data
Glossary |
503
Need help?
Do you have a question about the PowerConnect W Clearpass 100 Software and is the answer not in the manual?