Security

last person joined: yesterday 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

CPPM Role-Mapping

This thread has been viewed 1 times
  • 1.  CPPM Role-Mapping

    Posted Feb 16, 2015 05:56 AM

    Hi all,

    I'm new in this field.

    Can any one explain me how Role mapping works and when it triggers.

     

     



  • 2.  RE: CPPM Role-Mapping

    EMPLOYEE
    Posted Feb 16, 2015 06:23 AM
    Role mapping is optional. It after authentication and before enforcement. The idea is to "tag" the request with as much information as possible and then use that information in the enforcement policy. 


    Thanks, 
    Tim


  • 3.  RE: CPPM Role-Mapping

    Posted Feb 16, 2015 06:38 AM

    Thanks it helps.



  • 4.  RE: CPPM Role-Mapping

    Posted Feb 16, 2015 06:43 AM

    One more question, If the authentication type is post auth then?



  • 5.  RE: CPPM Role-Mapping

    EMPLOYEE
    Posted Feb 16, 2015 07:47 AM

    Logically, yes, role mapping happens after authentication. It is part of the authorization "step".