beautypg.com

HP Identity Driven Manager Software Series User Manual

Page 41

background image

Using Identity Driven Manager

IDM Configuration Model

5. Create an Access Policy Group, with rules containing the Location, Time,

System, and Access Profile that will be applied to the user when they login.

6. Assign Users to the appropriate Access Policy Group.

Once the configuration has been completed on the IDM Client GUI, it needs
to be deployed to the IDM Agent on the RADIUS Server. The authorization
controls can then be applied when IDM detects an authenticated user login.
If you do not deploy the IDM configuration to the Agent on the RADIUS server,
it will not be applied.

N O T E :

If you want to modify or delete an Access Policy Group, or the locations, times,
or access profiles used in the Access Policy Group, make sure your changes
will not adversely affect users assigned to that group before you deploy the
changes.

3-3