Aruba ClearPass Role Mapping and Enforcement Policy with Active Directory (Wireless 802.1X)
Network Access Control (NAC) is a critical component of modern enterprise security. One of the most widely deployed NAC platforms today is Aruba Networks ClearPass, which enables centralized authentication, authorization, and policy enforcement across wired and wireless networks.
In this article, we walk through a practical lab demonstrating how to:
-
Create roles in ClearPass
-
Build Role Mapping Policies
-
Create Enforcement Policies
-
Authenticate wireless users using 802.1X
-
Integrate ClearPass with Microsoft Active Directory
-
Validate authentication from an Aruba Wireless LAN Controller (WLC)
This guide is ideal for network engineers, security engineers, and anyone preparing for Aruba certifications.
Understanding Roles in Aruba ClearPass
In ClearPass, a role is simply a tag that represents a user or device attribute. Roles do not directly apply network access; instead, they are later evaluated by enforcement policies.
Example roles used in this lab:
-
IT
-
HR
-
Finance
Best practice is to design roles based on your organization’s directory structure. Reviewing your Active Directory Organizational Units (OUs) or user attributes (such as Department) helps you plan meaningful roles.
Creating Roles in ClearPass
Navigate to:
Identity → Roles
Create each role with a clear name and description, for example:
-
Role Name: IT
-
Description: Information Technology users
Repeat for HR and Finance.
Clear descriptions make troubleshooting and audits much easier later.
Configuring the Role Mapping Policy
A Role Mapping Policy determines which role is assigned to a user after authentication.
Key design choices:
-
Default Role: Other
-
Used if no conditions match
-
-
Role Evaluation Algorithm: Select All Matching
-
Because roles act as tags and multiple roles can be assigned
-
Example mappings:
-
If Department equals Finance → Assign Finance role
-
If Department equals HR → Assign HR role
-
If Department equals IT → Assign IT role
This allows ClearPass to dynamically tag users based on directory attributes.
Creating the Enforcement Policy
Enforcement Policies decide what happens after a role is assigned.
In this demonstration:
-
Default Profile: Deny Access
-
Role Evaluation Algorithm: First Match
Rules:
-
If Role equals Finance → Allow Access
-
If Role equals HR → Allow Access
-
If Role equals IT → Allow Access
At this stage, we keep enforcement simple. More advanced enforcement (dynamic VLANs or downloadable roles) can be added later.
Creating the 802.1X Wireless Service
Navigate to:
Configuration → Services → Add Service
Service Type:
802.1X Wireless
Key settings:
-
Enable Authorization
-
Enable Profile & Endpoint Classification
Service Categorization
Use the SSID name (for example: STAFF) as a condition so that authentication requests from this SSID hit this service.
Authentication Configuration
-
Authentication Method: PEAP (username/password)
-
Authentication Source: Active Directory
PEAP is commonly used for password-based authentication. Certificate-based authentication (EAP-TLS) can be implemented in later stages.
Authorization Configuration
Add the following as Authorization Sources:
-
Active Directory
-
Endpoint Repository
Then select:
-
Role Mapping Policy (created earlier)
-
Enforcement Policy (created earlier)
⚠️ Important:
If Active Directory is not added as an Authorization Source, role mapping will fail even if authentication succeeds.
This is one of the most common mistakes in ClearPass deployments.
Validating Authentication in Access Tracker
After connecting a wireless client:
-
Open Access Tracker
-
Confirm:
-
Authentication Source = Active Directory
-
Authorization Source = Active Directory
-
Assigned Role = Finance / HR / IT
-
Enforcement Profile = Allow Access
-
You can also see attributes such as:
-
Department
-
Group Memberships
-
SSID Name
-
Controller IP
-
AP Details
This confirms that role mapping and enforcement are functioning correctly.
Verifying on the Wireless Controller
On the WLC, verify the client session:
-
Client is connected
-
Username is visible
-
Authentication method is 802.1X
If ClearPass and WLC show consistent information, your integration is successful.
Summary
In this lab, we demonstrated how to:
-
Create roles
-
Map roles using AD attributes
-
Build enforcement policies
-
Configure an 802.1X wireless service
-
Authenticate users via Active Directory
-
Validate results using Access Tracker and WLC
This forms the foundation for more advanced NAC designs such as dynamic VLAN assignment, downloadable user roles, posture checks, and certificate-based authentication.
Watch the Full Video Tutorial
👉 https://youtu.be/6DV-0B3307A





Leave a Reply