Term
If a network has an existing authentication framework, and used Extreme EXOS based switching, _____ can be enabled to provide visibility to ExtremeControl. |
|
Definition
Identity Management (IDM) |
|
|
Term
IDM provides ExtremeManagement with XML notification events in order to _____. |
|
Definition
|
|
Term
In addition the RADIUS-based authentications, IDM can also monitor _____ to provide user information |
|
Definition
|
|
Term
IDM should only be used when _____ is the sole goal of the deployment. |
|
Definition
|
|
Term
IDM cannot be used to _____ to devices on network. If the deployment plan includes any sort of Control, a traditional authentication method should be used instead. |
|
Definition
|
|
Term
A ____ is not in use with IDM, because the switch sends the RADIUS request directly to the RADIUS server for authentication. |
|
Definition
|
|
Term
After the switch receives the RADIUS Accept message from RADIUS server, and the user is granted access, the switch sends a(n) _____ to Extreme Management Center. |
|
Definition
|
|
Term
The XML notification message sent to Extreme Management Center after authentication contains _____. |
|
Definition
information about the authenticated session |
|
|