Step 2: Configuring PPS

The following steps are involved in the Pulse Policy Secure configuration.

1.To create an Active Directory Standard Mode configuration, navigate to Authentication  > Auth. Servers and complete the configuration.

2.To configure user role, navigate to Users > User Roles > New Role and create a new role.

3.To configure user realm, navigate to Users > User Realms and create a new realm or edit a realm you have already created.

4.To create role mapping rule, navigate to Users > User Realms > <select user> > Role Mapping and complete the configuration.

Role-mapping rules can be defined to place users in Roles based on many different attributes, such as username, certificate, device attributes from Profiler or a batch of custom expressions. The Roles will define the level of access to different features and resources available on the network.

5.To configure sign-in policy, navigate to Authentication > Signing In > Sign-In Policies and complete the configuration.

Once you complete the basic configurations, you can explore more on PPS functionality.

For example:

PPS can be used as a standalone RADIUS server.

It can also be used for SNMP enforcement , MAC address authentication along with 802.1X.

Layer 3 enforcement with a Juniper Network SRX, Palo Alto Networks next generation firewall, Check Point firewall, or Fortinet Firewall.

Refer the Pulse Policy Secure Administration Guide for more details.