Hp Identity Driven Manager Software Series Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Oprogramowanie Hp Identity Driven Manager Software Series. HP Identity Driven Manager Software Series User Manual [fr] Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Identity Driven Manager

ProCurve Identity Driven Manager User’s GuideSoftware Release 2.0

Strona 2

1-6About ProCurve Identity Driven ManagerIntroduction• A Decision Manager that receives the user data and checks it against user data in the local IDM

Strona 3 - Contents

3-46Using Identity Driven ManagerUsing Manual ConfigurationModifying and Deleting RADIUS ServersTo modify an existing RADIUS Server:1. Use the IDM Tre

Strona 4 - A IDM Technical Reference

3-47Using Identity Driven ManagerUsing Manual ConfigurationAdding New UsersYou can let the IDM Agent automatically learn about the users from the RADI

Strona 5 - Chapter Contents

3-48Using Identity Driven ManagerUsing Manual Configuration3. If you want to restrict the user’s access to specific systems, click New System... to di

Strona 6

3-49Using Identity Driven ManagerUsing Manual ConfigurationNOTE: Access Policy Group settings are not applied to the user until you deploy the new con

Strona 7 - Why IDM?

3-50Using Identity Driven ManagerUsing the User Import WizardUsing the User Import WizardThe IDM User Import Wizard lets you add users to IDM from ano

Strona 8

3-51Using Identity Driven ManagerUsing the User Import WizardImporting Users from Active DirectoryTo import user information into IDM from an Active D

Strona 9 - IDM Architecture

3-52Using Identity Driven ManagerUsing the User Import Wizard3. Click the radio button to select the Active Directory data source.4. Click Next to con

Strona 10 - Introduction

3-53Using Identity Driven ManagerUsing the User Import Wizard5. Select the scope of Active Directory groups that you want to import user data from. 6.

Strona 11 - Terminology

3-54Using Identity Driven ManagerUsing the User Import Wizard8. Click the Select checkbox to choose the groups you want to import from the Active Dire

Strona 12

3-55Using Identity Driven ManagerUsing the User Import Wizard10. Click the Select checkbox to choose the users you want to import from the Active Dire

Strona 13 - IDM Specifications

1-7About ProCurve Identity Driven ManagerTerminologyTerminologyAuthentication The process of proving the user’s identity. In networks this involves th

Strona 14 - Additional Requirements

3-56Using Identity Driven ManagerUsing the User Import Wizardb. Click Next to continue. Repeat the process for each user. c. Click Finish to save the

Strona 15 - 2 for detailed instructions

3-57Using Identity Driven ManagerUsing the User Import Wizard A summary of the IDM Import displays. 15. Click Finish to exit the wizard.Importing User

Strona 16 - Registering Your IDM Software

3-58Using Identity Driven ManagerUsing the User Import Wizarda. To use the SSL authentication method, check the Use SSL checkbox.Note: To use SSL, ens

Strona 17

3-59Using Identity Driven ManagerUsing the User Import Wizardb. Select the LDAP Authentication type to be used with the imported user data:c. Click Ne

Strona 18

3-60Using Identity Driven ManagerUsing the User Import WizardFor Simple AuthenticationSimple authentication, which is not very secure, sends the LDAP

Strona 19 - ProCurve Support

3-61Using Identity Driven ManagerUsing the User Import WizardUsing Digest-MD5 AuthenticationThe SASL Digest MD5 authentication window is used to defin

Strona 20

3-62Using Identity Driven ManagerUsing the User Import WizardUsing Kerberos-V5 AuthenticationThe SASL Kerberos V5 authentication window is used to def

Strona 21 - Getting Started

3-63Using Identity Driven ManagerUsing the User Import WizardUsing External AuthenticationThe SASL External authentication window is used to define th

Strona 22 - Before You Begin

3-64Using Identity Driven ManagerUsing the User Import Wizard7. Click Next to continue to the Extract Users and Groups window. Importing LDAP X509 Use

Strona 23

3-65Using Identity Driven ManagerUsing the User Import WizardUsing Anonymous AuthenticationThe LDAP Anonymous Authentication window is used to define

Strona 24 - IDM Usage Strategies

1-8About ProCurve Identity Driven ManagerTerminologyRealm A Realm is similar to an Active Directory Domain, but it works across non-Windows (Linux, et

Strona 25 - Understanding the IDM Model

3-66Using Identity Driven ManagerUsing the User Import WizardEditing IDM Configuration for LDAP ImportThe IDM server includes several configuration fi

Strona 26 - IDM GUI Overview

3-67Using Identity Driven ManagerUsing the User Import Wizard LDAP_DIRECTORY_CONFIG { // Configuration for LDAP directory. Following values are for A

Strona 27

3-68Using Identity Driven ManagerUsing the User Import WizardImporting Users from XML filesIf you select to import users from an XML File, the XML Dat

Strona 28 - IDM Dashboard

3-69Using Identity Driven ManagerUsing the User Import WizardXML User Import File ExampleXML files used to import user data to IDM should have the fol

Strona 29 - Using the Navigation Tree

3-70Using Identity Driven ManagerUsing the User Import Wizard

Strona 30

4-14Troubleshooting IDMChapter ContentsIDM Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2Using Event Fi

Strona 31

4-2Troubleshooting IDMIDM EventsIDM Events The IDM Events window is used to view and manage IDM events generated by the IDM application or the IDM Age

Strona 32

4-3Troubleshooting IDMIDM EventsYou can sort the Events listing by Source, Severity, Status or Date. Click the desired column heading to sort events i

Strona 33 - Toolbars and Menus

4-4Troubleshooting IDMIDM Events3. Click the Acknowledge Event icon in the toolbar.To delete an IDM event:1. Click the Events tab on the IDM Dashboard

Strona 34

4-5Troubleshooting IDMIDM Events2. In the Manage Filters window, click New to display the New Filter window.3. Click the Filter Type drop-down arrow a

Strona 35 - IDM Preferences

1-9About ProCurve Identity Driven ManagerIDM SpecificationsIDM SpecificationsSupported DevicesProCurve Identity Driven Manager (IDM) supports authoriz

Strona 36

4-6Troubleshooting IDMIDM Events6. In the Criteria field, enter the criteria used to select events. The Criteria field works in conjunction with the O

Strona 37

4-7Troubleshooting IDMIDM Events4. Modify the filter attributes.5. Click Ok to save your changes and close the Modify Filters window.The changes to th

Strona 38 - Using IDM Reports

4-8Troubleshooting IDMIDM Events2. To delete IDM events once they are acknowledged, select the "Auto delete acknowledged events" checkbox.3.

Strona 39

4-9Troubleshooting IDMUsing Decision Manager TracingUsing Decision Manager TracingIDM provides a tracing tool (DMConfig.prp) and log file (DM-IDMDM.lo

Strona 40

4-10Troubleshooting IDMUsing Decision Manager TracingMiscellaneousFor authenticating a MAC-Auth user using Funk Steel Belted RADIUS (SBR) with IDM, th

Strona 41 - Scheduling a Report

A-1AIDM Technical ReferenceDevice Support for IDM FunctionalityDue to variations in hardware and software configuration of various ProCurve Devices, n

Strona 42

A-2IDM Technical ReferenceBest PracticesBest PracticesAuthentication MethodsThe IDM application is designed to support RADIUS server implementation wi

Strona 43

A-3IDM Technical ReferenceBest PracticesHandling Unknown or Unauthorized usersIf a user is authenticated in RADIUS, but is unknown to IDM, IDM will no

Strona 44

A-4IDM Technical ReferenceBest Practices In this instance, if the user attempts to login in during the times specified for the Weekends, they will be

Strona 45 - CSV (comma separated values)

A-5IDM Technical ReferenceTypes of User EventsTypes of User EventsThe USER_FAILED_LOGIN event happens whenever RADIUS sends IDM a message of an unsucc

Strona 46

1-10About ProCurve Identity Driven ManagerIDM Specifications ProCurve Manager Plus software must be installed for IDM to operate. The IDM software ca

Strona 47 - IDM Session Cleanup Policy

A-6IDM Technical ReferenceTypes of User EventsThis page is intentionally unused

Strona 48

Index–1IndexAAccess Attributes 3-22Access attributes 3-23Access Information 2-32Access Policyorder 3-34Access Policy Group 3-31Assignments

Strona 49 - User Session Information

Index–2Importing Users 3-51with XML files 3-68KKerberos V5 authentication 3-62LLDAP Authentication 3-59LDAP Directory settings 3-66LDAP Ser

Strona 50

Index–3User Access 3-37User ImportLDAP Server 3-57User Import Wizard 3-50User Location Information 2-31User MAC Addresses 2-20User Propertie

Strona 52

1-11About ProCurve Identity Driven ManagerIDM SpecificationsWhen you upgrade to IDM 2.0, you need to manually install the IDM Agent upgrade on your RA

Strona 53 - Finding a User

1-12About ProCurve Identity Driven ManagerRegistering Your IDM SoftwareRegistering Your IDM SoftwareThe ProCurve Manager installation CD includes a fu

Strona 54 - User Reports

1-13About ProCurve Identity Driven ManagerRegistering Your IDM SoftwareFigure 2. ProCurve License Administration dialogueYou can also get to this scre

Strona 55

1-14About ProCurve Identity Driven ManagerRegistering Your IDM SoftwareThe window is refreshed and the registration information, including your Licens

Strona 56 - IDM Configuration Model

1-15About ProCurve Identity Driven ManagerLearning to Use ProCurve IDMLearning to Use ProCurve IDMThe following information is available for learning

Strona 57

Hewlett-Packard Company 8000 Foothills Boulevard, m/s 5551 Roseville, California 95747-5551 http://www.procurve.com© Copyright 2004, 2005 Hewlett-Pack

Strona 58

1-16About ProCurve Identity Driven ManagerProCurve Support

Strona 59 - Configuring Locations

2-12Getting StartedChapter ContentsBefore You Begin . . . . . . . . . . . . . . . . . . . . . . . 2-2Installing the IDM Agent . . . . . . . . . . . .

Strona 60 - Adding a New Location

2-2Getting StartedBefore You BeginBefore You BeginIf you have not already done so, please review the list of supported devices and operating requireme

Strona 61

2-3Getting StartedBefore You BeginThe IDM Client is included with the PCM+ software. To install a remote PCM/IDM Client, download the PCM Client to a

Strona 62 - Modifying a Location

2-4Getting StartedBefore You Begin5. Create the Access Profiles, to set the VLAN, QoS, rate-limits (bandwidth) attributes, and the network resources t

Strona 63 - Deleting a Location

2-5Getting StartedBefore You BeginUnderstanding the IDM ModelThe first thing to understand, is that IDM works within the general concept of ‘domains’

Strona 64 - Configuring Times

2-6Getting StartedIDM GUI OverviewIDM GUI OverviewTo use the IDM client, launch the PCM Client on your PC. Select the ProCurve Manager option from the

Strona 65 - Creating a New Time

2-7Getting StartedIDM GUI OverviewSelect the IDM Tree tab at the bottom left of the PCM window to display the IDM Home window.Figure 2-2. IDM Home Win

Strona 66

2-8Getting StartedIDM GUI OverviewIDM DashboardThe IDM Dashboard tab (window) contains four separate panels, described below.Identity Management Statu

Strona 67 - Deleting a Time

2-9Getting StartedIDM GUI OverviewUsing the Navigation TreeThe navigation tree in the left pane of the IDM window provides access to IDM features usin

Strona 68 - Defining Holidays

iiiContents1 About ProCurve Identity Driven ManagerIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 69

2-10Getting StartedIDM GUI OverviewFigure 2-4. Realm Properties tabClick the Users tab, underneath the realm Properties tab, to view a list of users i

Strona 70 - Configuring Network Resources

2-11Getting StartedIDM GUI OverviewAccess Policy Groups: Click the Access Policy Group node to display the Access Policy Groups tab with a list of cur

Strona 71

2-12Getting StartedIDM GUI OverviewRADIUS Servers: Clicking the RADIUS Servers node displays the RADIUS List tab, with status and configuration inform

Strona 72 - Adding a Network Resource

2-13Getting StartedIDM GUI OverviewThe Activity Log tab underneath the properties display contains a listing of IDM application events for that RADIUS

Strona 73

2-14Getting StartedUsing IDM as a Monitoring ToolUsing IDM as a Monitoring ToolWhether or not you configure and apply access and authorization paramet

Strona 74

2-15Getting StartedUsing IDM as a Monitoring ToolIDM PreferencesThe IDM Preferences window is used to set up global attributes for session accounting

Strona 75 - Configuring Access Profiles

2-16Getting StartedUsing IDM as a Monitoring Toolthe IDM agent will look for the RADIUS attribute in the supplicant’s authentication request and act a

Strona 76

2-17Getting StartedUsing IDM as a Monitoring Tool9. If you do not want to add a timestamp to the archive filename, uncheck the Use timestamp in archiv

Strona 77 - Creating a New Access Profile

2-18Getting StartedUsing IDM ReportsUsing IDM ReportsIDM provides reports designed to help you monitor and analyze usage patterns for network resource

Strona 78

2-19Getting StartedUsing IDM ReportsYou can save the report to a file, or print the report. To apply customized Report Header information for your com

Strona 79

ivContents3 Using Identity Driven ManagerIDM Configuration Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2Co

Strona 80

2-20Getting StartedUsing IDM ReportsThe following information is provided for each user included in the Bandwidth Usage report:IDM Statistics: The IDM

Strona 81

2-21Getting StartedUsing IDM ReportsUser Report: The User Report lists information for recent sessions in which the user participated, similar to the

Strona 82

2-22Getting StartedUsing IDM Reports.a. Enter the Start date and time. b. Click one of the radio buttons to select the Recurrence Pattern.c. Click to

Strona 83 - Modifying an Access Profile

2-23Getting StartedUsing IDM Reports 5. Click to select the Report Type from the list.6. Click Next to continue to the Report Filter window..

Strona 84 - Deleting an Access Profile

2-24Getting StartedUsing IDM Reports7. Depending on the report type, select the Report Filters, to configure what data is included in the report. For

Strona 85 - Defining Access Policy Groups

2-25Getting StartedUsing IDM Reports 9. Click the radio button to select the Report Format for output: PDF, HTML, or CSV (comma separated values).10.

Strona 86

2-26Getting StartedUsing IDM Reports11. Select the Delivery method: FTP, File, or Email from the pull-down menu. Then set the parameters needed to def

Strona 87

2-27Getting StartedUsing IDM ReportsIDM Session Cleanup PolicyThe IDM Session Cleanup Policy is included in the PCM+ policies by default when you inst

Strona 88

2-28Getting StartedUsing IDM Reports4. Set the Start Date for enforcement of the policy. The default is the start date and time for IDM. You can type

Strona 89

2-29Getting StartedUser Session InformationUser Session InformationYou can use IDM to just monitor the network, and receive detailed information about

Strona 90

1-11 About ProCurve Identity Driven ManagerChapter ContentsIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 91 - Configuring User Access

2-30Getting StartedUser Session InformationThe Session List provides a listing of recent sessions, including the following information: The User Prop

Strona 92

2-31Getting StartedUser Session InformationThe Session Information tab of the User Status window contains the following information:To track the user’

Strona 93 - Using Global Rules

2-32Getting StartedUser Session InformationThe Location Information tab of the User Status window contains the following information:Click the Disable

Strona 94

2-33Getting StartedUser Session InformationFinding a UserThe Find User feature lets you search for and display information about a user by name or MAC

Strona 95 - Changing Global Rules

2-34Getting StartedUser Session InformationIn the MAC address field, type the MAC address of the computer for which you want to find and display infor

Strona 96 - RADIUS Servers

3-13Using Identity Driven ManagerChapter ContentsIDM Configuration Model. . . . . . . . . . . . . . . . . . . . . . . . 3-2Configuration Process Revi

Strona 97 - Using Manual Configuration

3-2Using Identity Driven ManagerIDM Configuration ModelIDM Configuration Model As described in the IDM model on page 2-5, everything relates to the to

Strona 98 - Modifying and Deleting Realms

3-3Using Identity Driven ManagerIDM Configuration Model3. If you intend to restrict a user’s access to specific systems, based on the system they use

Strona 99 - Defining RADIUS Servers

3-4Using Identity Driven ManagerIDM Configuration ModelFigure 3-1. Identity Management Configuration, default displayClick the node in the navigation

Strona 100

3-5Using Identity Driven ManagerConfiguring LocationsConfiguring LocationsLocations in IDM identify the switch and/or ports on the switch and wireless

Strona 101 - Adding New Users

1-2About ProCurve Identity Driven ManagerIntroductionIntroductionNetwork usage has skyrocketed with the expansion of the Internet, wireless, and conve

Strona 102 - Configuring User Systems

3-6Using Identity Driven ManagerConfiguring LocationsAdding a New LocationTo create a new location:1. Click the New Location icon in the toolbar to di

Strona 103 - Modifying and Deleting Users

3-7Using Identity Driven ManagerConfiguring Locations5. Enter the Device to be added using the Device Selection pull-downs, or select the Manually ent

Strona 104 - Using the User Import Wizard

3-8Using Identity Driven ManagerConfiguring LocationsNOTE: If a switch in the device list is not configured to authenticate with the RADIUS server, th

Strona 105 - Data Source selection window

3-9Using Identity Driven ManagerConfiguring LocationsNOTE: When modifying Locations, make sure all devices for the location are config-ured with the a

Strona 106 - window

3-10Using Identity Driven ManagerConfiguring TimesConfiguring TimesTimes are used to define the hours and days when a user can connect to the network.

Strona 107

3-11Using Identity Driven ManagerConfiguring TimesCreating a New TimeTo configure a Time:1. Click the Times node in the Identity Management Configurat

Strona 108 - Add Users window

3-12Using Identity Driven ManagerConfiguring Times3. Define the properties for the new time. 4. Click Ok to save the new "Time" and close th

Strona 109

3-13Using Identity Driven ManagerConfiguring TimesModifying a Time1. Click the Times node in the Identity Management Configuration navigation tree to

Strona 110

3-14Using Identity Driven ManagerConfiguring TimesDefining HolidaysTo add holidays for use when defining Times in IDM: 1. Click the Times node in the

Strona 111 - LDAP Authentication window

3-15Using Identity Driven ManagerConfiguring Times

Strona 112

1-3About ProCurve Identity Driven ManagerIntroductionWhy IDM?Today, access control using a RADIUS system and ProCurve devices (switches or wireless ac

Strona 113

3-16Using Identity Driven ManagerConfiguring Network ResourcesConfiguring Network ResourcesThe Network Resources in IDM are used to permit or deny tra

Strona 114 - For Simple Authentication

3-17Using Identity Driven ManagerConfiguring Network ResourcesThe Network Resources window lists the name and parameters for defined resources, includ

Strona 115

3-18Using Identity Driven ManagerConfiguring Network ResourcesAdding a Network ResourceTo define a Network Resource:1. Click the Network Resources nod

Strona 116

3-19Using Identity Driven ManagerConfiguring Network Resources* Valid Friendly port names supported in IDM include: ftp, syslog, ldap, http, imap4, im

Strona 117 - Using External Authentication

3-20Using Identity Driven ManagerConfiguring Network ResourcesTo Delete a Network Resource: 1. Click the Network Resources node in the Identity Manage

Strona 118

3-21Using Identity Driven ManagerConfiguring Access ProfilesConfiguring Access ProfilesIDM uses an Access Profile to set the VLAN, QoS, Bandwidth (rat

Strona 119

3-22Using Identity Driven ManagerConfiguring Access ProfilesClick the Access Profile node in the navigation tree, or double-click on a profile in the

Strona 120

3-23Using Identity Driven ManagerConfiguring Access ProfilesCreating a New Access Profile1. Click the Access Profiles node in the Identity Management

Strona 121

3-24Using Identity Driven ManagerConfiguring Access ProfilesNOTE: If you are assigning any VLAN other than the default VLAN, ensure that the VLAN is c

Strona 122

3-25Using Identity Driven ManagerConfiguring Access Profiles6. To permit access to Network Resources:a. Select the Resource in the Available Resources

Strona 123 - XML User Import File Example

1-4About ProCurve Identity Driven ManagerIntroductionWhen using IDM, the authentication process proceeds as described in the first three steps, but fr

Strona 124

3-26Using Identity Driven ManagerConfiguring Access Profiles7. To deny access to Network Resources:a. Select the Resource in the Available Resources l

Strona 125 - Troubleshooting IDM

3-27Using Identity Driven ManagerConfiguring Access Profiles8. Set the priority (order of evaluation) for the Network Resources. To change the priorit

Strona 126 - IDM Events

3-28Using Identity Driven ManagerConfiguring Access Profiles11. Click Next to continue to the Resource Accounting window. 12. Click the check box to e

Strona 127

3-29Using Identity Driven ManagerConfiguring Access Profiles14. Click Finish to save the Network Resource Assignments to the Access Profile and close

Strona 128 - Using Event Filters

3-30Using Identity Driven ManagerConfiguring Access ProfilesNOTE: When modifying Access Profiles, make sure the appropriate VLANs are con-figured on t

Strona 129

3-31Using Identity Driven ManagerDefining Access Policy GroupsDefining Access Policy GroupsAn Access Policy Group (APG) contains rules that define the

Strona 130

3-32Using Identity Driven ManagerDefining Access Policy GroupsTo begin, expand the Realms node to display the Access Policy Group node in the IDM tree

Strona 131 - Setting IDM Event Preferences

3-33Using Identity Driven ManagerDefining Access Policy Groups3. Type in a Name and Description for the Access Policy Group.4. Click New... to display

Strona 132 - Using Activity Logs

3-34Using Identity Driven ManagerDefining Access Policy Groups6. Repeat the process for each rule you want to apply to the APG.7. The Access rules are

Strona 133

3-35Using Identity Driven ManagerDefining Access Policy GroupsUsing IDM with Endpoint Integrity SystemsYou can create access profiles in IDM to work i

Strona 134 - Miscellaneous

1-5About ProCurve Identity Driven ManagerIntroductionIDM ArchitectureIn IDM, when a user attempts to connect to the network through an edge switch, th

Strona 135 - IDM Technical Reference

3-36Using Identity Driven ManagerDefining Access Policy GroupsModifying an Access Policy Group1. Click the Access Policy Group node in the IDM tree to

Strona 136 - Best Practices

3-37Using Identity Driven ManagerConfiguring User AccessConfiguring User AccessThe process of configuring User access to network resources using IDM i

Strona 137 - Allowing vs. Rejecting Access

3-38Using Identity Driven ManagerConfiguring User AccessAdding Users to an Access Policy GroupTo assign a user to an access policy group:1. Expand the

Strona 138 - Rate-Limiting

3-39Using Identity Driven ManagerConfiguring User AccessUsing Global RulesGlobal Rules can be used to provide an "exception process" to the

Strona 139 - Types of User Events

3-40Using Identity Driven ManagerConfiguring User Access Creating a Global Rule is similar to creating Access Rules for an Access Profile Group.To cre

Strona 140

3-41Using Identity Driven ManagerConfiguring User Accessa. Select the Location where the global rule will be applied, or "ANY".b. Select the

Strona 141

3-42Using Identity Driven ManagerDeploying Configurations to the AgentDeploying Configurations to the AgentOnce you have configured the Access Policy

Strona 142 - Index–2

3-43Using Identity Driven ManagerUsing Manual ConfigurationUsing Manual Configuration It is simplest to let the IDM Agent run and collect information

Strona 143

3-44Using Identity Driven ManagerUsing Manual ConfigurationModifying and Deleting RealmsTo modify an existing Realm:1. Select the Realm in the Realms

Strona 144

3-45Using Identity Driven ManagerUsing Manual ConfigurationDefining RADIUS ServersYou can let the IDM Agent learn about the RADIUS server on which it

Komentarze do niniejszej Instrukcji

Brak uwag