Identity Management Overview

The identity management feature allows you to learn more about the users and devices (such as phones and routers) that connect to a switch. In this chapter, users and devices are collectively called identities. The Identity Management feature:
Note

Note

IDM and ONEPolicy are not supported together and it is not recommended to enable both, since handling rule/role-based actions is not supported, except to support Kerberos Authentication with NAC as a RADIUS server and can be used in conjunction with IDM XML event triggers.
Note

Note

This chapter discusses identity management features that are managed using the switch CLI. Related features are described in other chapters and in the Extreme Management Center and Ridgeline product documentation. For a description of identity management that ties all the related components together, see the application note titled Deploying an Identity Aware Network, which is available from the Extreme Networks website.
Note

Note

When using IDM commands, you should generally avoid the encrypted option. Passwords provided in commands in plain text are saved in encrypted format.