Cloud Authentication and Policy Overview

Cloud Authentication and Policy allows you to configure user and client access policies that provide a secured, cloud-based network access control (NAC Network Access Control. NAC is a computer networking solution that uses a set of protocols to define and implement a policy that describes how devices can secure access to network nodes when they initially attempt to connect to a network.). In Aruba Central, you can configure these policies and provide an on-boarding URL Uniform Resource Locator. URL is a global address used for locating web resources on the Internet. for the network users to connect to the network. As the users attempt to connect to the network, you can monitor the authentication access requests and sessions on the monitoring dashboards. You can view more details of each access request and session to analyze them or identify any issues.

Cloud Authentication and Policy Architecture

The following Cloud Authentication and Policy architecture provides an overview of how the cloud identity store, user and client policy, the WLAN network, and the clients connect to establish a secured cloud network.

Figure 1  Cloud Authentication and Policy Architecture

  • Clients and Aruba Devices: Based on the client access policy in the Cloud Authentication and Policy configuration, the Aruba devices that are managed through Aruba Central help to connect the clients to the enterprise network. The client roles and WLAN SSIDs set up on the IAPs are used in the Cloud Authentication and Policy to control the network access. You must use the on-boarding URL provided by the network administrator to download the wireless network profiles and connect the clients to the network, through Aruba devices. You can also use the Aruba Onboard app to connect the clients to the network.
  • Cloud Authentication and Policy: With Aruba Central, administrator can configure separate user policy and client policy as part of configuring user and client access policy. This flexibility of configuring independent user and client access policies allows the administrator to configure security levels at both user and client level. For more information about configuring user and client access policy, see Configuring Cloud Authentication and Policy .
  • Cloud Identity Store: Aruba Cloud Identity configuration uses user group information from the identity store to allow end users to connect to Wi-Fi Wi-Fi is a technology that allows electronic devices to connect to a WLAN network, mainly using the 2.4 GHz and 5 GHz radio bands. Wi-Fi can apply to products that use any 802.11 standard. networks securely and automatically. With Aruba Central, you can configure and manage users and user groups in a centralized fashion. Cloud Authentication and Policy integrates with your existing cloud identity providers to authenticate user’s information and assign them the right level of network access. Cloud Authentication and Policy retrieves and validates all the necessary attributes from the identity providers before enforcing role-based access policies associated with the user groups. Currently, Cloud Authentication and Policy supports two external identity providers, that is, Google Workspace and Microsoft Azure AD.

    For more information about configuring Google Workspace and Microsoft Azure AD, see the following topics:

Roles Applicable for Configuring Cloud Authentication and Policy

With Aruba Central, you can configure client roles with appropriate access rules while configuring a WLAN SSID. These client roles are assigned to user groups, which are mapped from the external identity server, while configuring user and client access policy for users.

For more information about configuring user roles and associated access rules, and configuring user and client access policies, see the following topics:

You can create user roles while configuring the WLAN SSID by selecting Role Based security level from the Security Level slider in the Access tab. For more information, see Configuring Cloud Authentication and Policy Server in a WLAN Network.

For more information about Cloud Authentication and Policy implementation, see the following topics: