The HP IMC User Access Management (UAM) module supports user identity authentication based on access policies associated with infrastructure resources such as routers, switches, and servers. Integrated with the Intelligent Management Center (IMC) platform, the HP IMC UAM solution extends management to wired, wireless, and remote network users - enabling the integration, correlation, and collaboration of network device management and user management on a single, unified platform. This solution provides a full-featured Remote Authentication Dial-In User Service (RADIUS) server that supports centralized Authentication, Authorization and Accounting (AAA) management of endpoints that connect and use network services. By furnishing authentication and authorization for endpoints accessing the network edge, the HP IMC UAM software module helps reduce vulnerabilities and security breaches. Policy management provides access control with tiered privilege levels.
Centralized resource management of devices and users
In addition to the centralized management of network devices, UAM provides centralized maintenance of basic user information, such as user name, identity number, contact address, telephone, email, and user group. The supplement user information function allows you to customize user information as required, such as student ID and grade for campus networks, or department and title for enterprise networks.
Integration of device and user management
Admins can select to view users by different categories, such as location (access device), improving troubleshooting and reporting. Admins can select a device and perform access operations like dropping a user. Any online user can view the details (such as alarms, performance) of the access device, reducing help desk calls. Integrating network device and user data into a common interface reduces deployment and aids in both device and user management.
Multiple access authentication modes
UAM supports authentication modes like 802.1x, VPN, portal, and wireless access, identity modes like PAP, CHAP, EAP-MD5, EAP-TLS, and PEAP to fit into applications with different security requirements. Access user can be bound with the hardware information, such as device IP address, access port, VLAN, user IP address, and user MAC address. This ensures secure authentication and prevents account spoofing and illegal access.
Various right control measures for stricter access controlProduct Highlights
Policies can be time or location specific. In addition, policies can include bandwidth limitations or set the number of concurrent user sessions. The system can be used to prevent IP spoofing and address conflicts. To prevent spreading of corporate information without permission, admins can disable use of multiple NICs or dial-up networks, and monitor or block access to USB or CD drives.
- Roles-based management and administration