beautypg.com

Using idm with endpoint integrity systems – HP Identity Driven Manager Software Series User Manual

Page 89

background image

3-35

Using Identity Driven Manager

Defining Access Policy Groups

Using IDM with Endpoint Integrity Systems

You can create access profiles in IDM to work in conjunction with endpoint
integrity (host integrity) applications to verify that systems attempting to
connect to the network meet security requirements. To use the Endpoint
Integrity support options you need to select the Endpoint Integrity option in
the IDM Preferences window (

Tools->Preferences->Identity Management

).

With the Endpoint Integrity preference set, the

Endpoint Integrity

option will

appear in the

Access Rules

windows.

Select

PASS to apply the access rule in cases where the system the

user is logged in on passes the endpoint integrity check.

Select

FAIL to apply the access rule in cases where the system the user

is logged in on fails the endpoint integrity check.

Select

ANY to apply the access rule regardless of the status passed

from the endpoint integrity system.

For example, if you want to restrict access to a specific (remediation) VLAN
when the endpoint integrity check fails, create a Location that specifies the
remediation VLAN, then create an access rule that will put the user on that
Location if the Host Integrity value is

FAIL

.