Creating an Adaptive Policy

You can use an adaptive policy with RADIUS or DPSK to authenticate clients. Only clients that meet all the conditions specified in the adaptive policy are granted access. To enable this feature, activate the Adaptive Policy option within the DPSK services settings. Adaptive policy supports certificate templates. Refer to Adding a DPSK Network for information on how to add a DPSK network.

Complete the following steps to create an Adaptive Policy:

  1. From the navigation bar, select Network Control > My Services.
    The My Services page is displayed.
    Note: The My Services page displays tiles only for those services, policies, and profiles, that have already had one instance added to the account.The Service Catalog page always displays the complete list of all services, policies, and profiles available in RUCKUS One.
    My Services Page
  2. Click Add in the Adaptive Policy tile.
    The Add Adaptive Policy Instance page appears, displaying the following template instance types:
    • RADIUS Attribute Group: Displays the list of RADIUS attribute groups.
    • Adaptive Policy: Displays the list of adaptive policies.
    • Adaptive Policy Set: Displays the list of adaptive policy sets.
  3. Select Adaptive Policy and click Next.
    The Add Adaptive Policy page is displayed.
    Adding an Adaptive Policy
  4. Complete the following fields to configure and add an Adaptive Policy:
    • Policy Name: Enter a name for the Adaptive Policy.
    • Policy Type: Select RADIUS or DPSK.
    • Access Conditions: Complete the following steps to configure a client access condition. You can add more than one condition.
      1. Click Add. The Add Access Condition dialog box is displayed.
        Add Access Condition Sidebar
      2. Select one of the options from the Condition Type drop-down:
        • Device MAC Address (Regex): Select this condition from the Condition Type drop-down and enter a condition in the Condition Value field, then click Add.
          Configuring Device MAC Address (Regex) as the Condition Type
        • DPSK Username (Regex): Select this condition from the Condition Type drop-down and enter a condition in the Condition Value field, then click Add.
          Configuring DPSK Username (Regex) as the Condition Type
        • Identity (Regex): Select this condition from the Condition Type drop-down. Select an attribute from the Sub-type Attributes drop-down. The available options are: Display Name (Auth Server) (Regex), Email (Regex), Email (Auth Server) (Regex), First Name (Auth Server) (Regex), Groups (Auth Server) (Regex), Identity Group Name (Regex), Identity Name (Regex), and Last Name (Auth Server) (Regex). Enter a condition in the Condition Value field then, click Add.
          Note: RUCKUS One Identity Management provides robust support for common identity attributes, enhancing the functionality of Adaptive Policy. Adaptive Policy leverages all available identity attributes for comprehensive evaluation within its rules. The Identity store accommodates common attributes and facilitates the storage of raw attribute containers retrieved from various authentication services. Furthermore, Identity supports the integration of custom fields, enabling administrators to map and utilize these fields when defining an Identity within the system.
          Configuring Identity (Regex) as the Condition Type
        • Specific Time: Select this condition from the Condition Type drop-down and select an option in the When section. Available options are: Weekend (Sat & Sun), Weekdays (Mon-Fri) and All Days. After selecting the specific time, click Add.
          Configuring Specific Time as the Condition Type
        • Wireless Network "SSID" (Regex): Select this condition from the Condition Type drop-down and enter a condition in the Condition Value field, then click Add.
          Configuring Wireless Network "SSID" (Regex) as the Condition Type
      3. (OPTIONAL) Edit or delete any Condition Type that appears in the list of Access Conditions. Select a specific Condition Type, then click Edit (to modify only the Condition Value) or Delete to delete the condition, respectively. If deleting, you will be prompted to confirm the deletion.
      4. Click Add.
    • RADIUS Attribute Group: The configured RADIUS attributes are applied to the clients when this policy is matched. Complete the following steps to select or configure the RADIUS Attribute Group.
      1. Click Select Group. The Select RADIUS Attribute Group sidebar is displayed.
      2. Click the radio button beside one pre-existing RADIUS Attribute Group name, then click Select. The sidebar disappears and the selected RADIUS Attribute Group appears on the Add Adaptive Policy page. Proceed to step 4.
      3. Alternatively, click Add Group to create a new RADIUS Attribute Group. The Add RADIUS Attribute Group sidebar is displayed; complete the following fields:
        • Group Name: Enter the name for the RADIUS Attribute Group.
        • RADIUS Attributes: These attributes will be returned when a client connects. Complete the following steps to add RADIUS Attributes:
          1. Click Add. The Add RADIUS Attribute dialog box is displayed.
            Add RADIUS Attribute Dialog Box
          2. In the Attribute Type section, select the attribute type from the first drop-down (Common Attributes, Foundry, Ruckus, WISPr, or General), then select the specific attribute name from the second drop-down. The list of attribute names differs depending upon the selected attribute type.
          3. The Condition Value comprises two fields, an action and a value. For the action field, select from Add (Multiple), Add or Replace (Single), or Add if it Doesn't Exist and then enter a valid number in the second field.
          4. Click Add to add the configured RADIUS attribute to the RADIUS Attributes table.
          5. Click Add to add the configured RADIUS attribute group to the RADIUS Attribute Group table.
          6. Click the radio button beside the RADIUS Attribute Group name, then click the Select. The sidebar disappears and the selected RADIUS Attribute Group appears on the Add Adaptive Policy page.
  5. Click Apply.
    The Adaptive Policy is created and is displayed in the Adaptive Policy tab, and any newly-created RADIUS Attribute Group is displayed in the RADIUS Attribute Groups tab.
  6. (Optional) Complete the following steps to create a new RADIUS Attribute Group.
    1. In the Adaptive Policy page, click the RADIUS Attribute Groups tab and click Add Group.
      The Add RADIUS Attributes Group page is displayed.
      Adding a RADIUS Attributes Group
    2. In the Add RADIUS Attributes Group page, complete the following:
      • Group Name: Enter a group name.
      • RADIUS Attributes: Configure the RADIUS attributes. These attributes are returned when a client connects. Click Add to access the Add RADIUS Attribute sidebar.
    3. In the Add RADIUS Attribute sidebar, complete the following:
      • In the Attribute Type section, select the attribute type from the first drop-down (Common Attributes, Foundry, Ruckus, WISPr, or General), then select the specific attribute name from the second drop-down. The list of attribute names differs depending upon the selected attribute type.
        For WISPr, select one of the following options:
        • WISPr-Bandwidth-Max-Down (INTEGER)
        • WISPr-Bandwidth-Max-Up (INTEGER)
        • WISPr-Bandwidth-Min-Down (INTEGER)
        • WISPr-Bandwidth-Min-Up (INTEGER)
        • WISPr-Billing-Class-Of-Service (STRING)
        • WISPr-Location-ID (STRING)
        • WISPr-Location-Name (STRING)
        • WISPr-Logoff-URL (STRING)
        • WISPr-Redirection-URL (STRING)
        • WISPr-Session-Terminate-End-Of-Day (STRING)
        • WISPr-Session-Terminate-Time (STRING)
        Note: Foundry, Ruckus, and Wireless Internet Service Provider (WISPr) attributes are vendor-specific. Interpretation and usage of these attributes depend on the specific hardware implementation (Access Points, Switches) rather than the RADIUS server. Refer to the documentation of your network hardware (APs, Switches) for detailed instructions on how to configure and utilize these attributes.
      • The Condition Value comprises two fields, an action and a value. For the action field, select from Add (Multiple), Add or Replace (Single), or Add if it Doesn't Exist then enter a valid number in the second field.
    4. Click Apply.
      The newly created RADIUS Attribute Group is displayed in the table and is available for selection when creating or editing an Adaptive Policy.
  7. (Optional) Complete the following steps to create an Adaptive Policy Set.
    You can curate multiple adaptive policies into a single Adaptive Policy Set, creating a superset of authentication rules. The credentials of the connecting device will be verified against the complete set of authentication rules. If the device matches all of the rules, it will be connected.
    Note: Integration of the Adaptive Policy Set with an Identity Group allows users to apply a single Adaptive Policy Set across different services, such as certificate templates, DPSK, and MAC authentication. If the Adaptive Policy Set is linked only to the identity group, the default access is set to Reject. If the Adaptive Policy Set is linked to both the identity group and a service (for example, DPSK), the policy set conditions are first validated at the identity group level. If the condition matches, the client will be connected; if not, the policy set linked to the service (DPSK) will be evaluated.
    1. Select the Adaptive Policy Sets tab and click Add Set.
      The Add Adaptive Policy Set page is displayed.
      Adding Adaptive Policy Set
    2. Enter a name for the Adaptive Policy Set.
    3. Complete the following steps to select the access policies:
      Selecting Access Policies
      1. Click Select Policies. The Select Access Policies sidebar is displayed.
      2. Use the toggle to select the desired policies. Click Add Policy to create a new policy.
      3. Click Add.

        The list of selected policies appears in the Add Adaptive Policy Set table. When multiple policy sets exist, you can reorder them using the icon to control the order in which the authentication policies are applied.

      4. Click Apply.

        The Adaptive Policy Set is added and appears in the Adaptive Policy Sets table.