Refer to the exhibit.
An AD user's department attribute value is configured as ''QA''. The user authenticates from a laptop running MAC OS X.
Which role is assigned to the user in ClearPass?
None of the Listed Role Name conditions are met.
Refer to the exhibit.
Based on the Attribute configuration shown, which statement accurately describes the status of attribute values?
Which components can use Active Directory authorization attributes for the decision-making process? (Select two.)
C: Role Mappings Page - Rules Editor Page Parameters
D: Enforcement Policy Attributes tab Parameters
Refer to the exhibit.
Based on the Authentication sources configuration shown, which statement accurately describes the outcome if the user is not found?
Policy Manager looks for the device or user by executing the first filter associated with the authentication source.
After the device or user is found, Policy Manager then authenticates this entity against this authentication
source. The flow is outlined below:
* On successful authentication, Policy Manager moves on to the next stage of policy evaluation, which
collects role mapping attributes from the authorization sources.
* Where no authentication source is specified (for example, for unmanageable devices), Policy Manager
passes the request to the next configured policy component for this service.
* If Policy Manager does not find the connecting entity in any of the configured authentication sources, it
rejects the request.
Which authorization servers are supported by ClearPass? (Select two.)
Authentication Sources can be one or more instances of the following examples:
* Active Directory
* LDAP Directory
* SQL DB
* Token Server
* Policy Manager local DB