SlideShare a Scribd company logo
1 of 42
#ATM16
ClearPass
Exchange
Gary Jenkins / Abhijit Das - CSE
@ArubaNetworks |
2
What is ClearPass Exchange?
It is a partner ecosystem based on API’s and Syslog messaging that allows
customers to share context between ClearPass, MDM/EMM, Firewalls,
Wi-Fi equipment, Wired switches, VPN concentrators and other
solutions (SIEM, PMS, Trouble-ticket, etc.).
3
• Included in Base License
• Integrates with virtually any web
based application
• Allows customers to build their own
integrations
• Recipes available on Airheads
Community
• Built-in native integration (over
65 and counting)
• Build-your-own integrations
utilizing HTTP RESTful APIs
4
Examples of 3rd party integrations
5
How does the Exchange process work?
6
Palo Alto Networks Firewall example
7
Twilio example
8
How did ClearPass communicate with
Twilio?
9
Twilio communication
10
Twilio communication
11
Twilio Actions
12
How did we get the visitor’s phone #?
13
From the Guest database!
14
When do the 3rd party applications update?
15
It happens in post-authentication
16#ATM16
Enforcement Points
[Firewalls] PANW, CheckPoint, FortiNet, Intel
MLC, Juniper SRX, iboss
@ArubaNetworks |
17#ATM16@ArubaNetworks |
Enforcement
RADIUS REQUEST
Service Matching
Authentication
Authorization
Role Mapping
RADIUS RESPONSE
HTTP
ENFORCEMENT
RADIUS Accounting
Target: Checkpoint, Fortinet, Websense, others
18#ATM16@ArubaNetworks |
Firewall Integration
– Today’s challenge is to allow traffic
based upon contextual data such as
username
– Session Notification Enforcement - is
introduced in 6.5.0. Notification of a change
in IP address can now be sent to any external
context server (such as a firewall) by
configuring that server as a generic HTTP
server and adding the appropriate generic
HTTP context server actions. The content of
the payload to be posted by CPPM to the
external server is based on the REST API
defined by the external server for
communication.
19#ATM16@ArubaNetworks |
What ClearPass sees that it can send to the firewall
– When a user authenticates to the wireless or
wired network using ClearPass we gather
information about the user.
• Username
• AD information
• Domain
• IP address and MAC
• Location
• Device Type
• Device OS
Internet
Internal Segment
(include Staff, Student, Teacher, etc)
Existing
Firewall
Next Gen Firewall
ClearPass MS AD
• V-wire inline mode
• Monitoring Internet segment
• Provides application visibility
• Enabled Threat Prevention ,
URL filtering , Wildfire
• User-ID feature
• Standalone mode
• Integrated with Firewall
• Authentication Users (Students)
• 802.1x Authentication for Wi-FI
User
Controller + AP
LAN Switch
20#ATM16@ArubaNetworks |
Event Network Diagram Flow
Internet
Internal Segment
(include Staff, Student, Teacher, etc)
Next Gen Firewall
ClearPass MS AD
Controller + AP
LAN Switch
If a device breaks one of the firewall rules it can signal ClearPass
that will signal back to the wired or wireless network to move the
device to a quarantine network. It can also send a text to them via
twilio and open a helpdesk ticket
21#ATM16
Mobile Client Enforcement
[MDM] MobileIron, AirWatch, BES, JAMF,
Etc., Google Admin Console
@ArubaNetworks |
22#ATM16@ArubaNetworks |
MDM Integration – Google
Admin Console – Create account on External
Server
• Client ID and Client Secret
Manufacturer, Model
– Model, OS version, Serial
Number
Owner
– Display Name
Ownership
– Corporate, Personal
MDM Identifier
– MDM Enabled
Security Status
– Compromised, Blacklist or
Required App Encryption
enabled, Last Check-in
23#ATM16
Reporting
Splunk, ArcSight, Qradar
@ArubaNetworks |
24#ATM16@ArubaNetworks |
ClearPass Splunk App
A rich set of dashboards to visualize and navigate the wealth of information captured by ClearPass.
25#ATM16@ArubaNetworks |
ClearPass Splunk App – Customer Example
“I had to apply a new radius cert, and for all of the corporate devices (windows and mobile) we have ways to
whitelist the radius server certificate in advance, but personal IOS devices detected a cert change and
wouldn’t connect until a user drills into their wifi settings and accept the new cert. Before doing that it just
aborts the authentication attempt as soon as it see the radius server cert doesn’t match what it has cached,
which just shows as a timeout in ClearPass. The trend graph using Splunk gave a pretty cool visual of what
happened when I made that change, and how it diminished as people figured out they weren’t connecting,
drilled in, and accepted the cert. Blue arrow is when I made the change.”
26#ATM16
API Explorer
@ArubaNetworks |
27
What about talking to ClearPass from
another application?
28
We use the RESTful APIs.
29
Example profiles:
30
So, how do we know how to use the APIs?
31
You can actually try it out in the browser
itself by using the API explorer.
32
The API explorer shows you all the functions
that are available:
33
Let’s take a look at the Guest method under
Guest Manager
34
Under Guest, we can
list/add/get/update/replace and delete guests
35
Before we take a look at the list function,
how do we authorize the API call?
36
Let’s take a look at how to use the list
37
Results of the call:
38
Response code and headers of the call:
39
How to use it in a script?
40
What’s coming up next in Exchange?
41
Join Aruba’s Titans of Tomorrow
force in the fight against network
mayhem. Find out what your
IT superpower is.
Share your results with friends
and receive a free superpower
t-shirt.
www.arubatitans.com
Thank you
gary.jenkins@hpe.com
abhijit.das@hpe.com

More Related Content

What's hot

EMEA Airheads- Aruba IAP Webinar – How AirGroup service works in Aruba Instan...
EMEA Airheads- Aruba IAP Webinar – How AirGroup service works in Aruba Instan...EMEA Airheads- Aruba IAP Webinar – How AirGroup service works in Aruba Instan...
EMEA Airheads- Aruba IAP Webinar – How AirGroup service works in Aruba Instan...Aruba, a Hewlett Packard Enterprise company
 

What's hot (20)

Advanced Aruba ClearPass Workshop
Advanced Aruba ClearPass WorkshopAdvanced Aruba ClearPass Workshop
Advanced Aruba ClearPass Workshop
 
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
Aruba WLANs 101 and design fundamentals
Aruba WLANs 101 and design fundamentalsAruba WLANs 101 and design fundamentals
Aruba WLANs 101 and design fundamentals
 
Advanced ClearPass Workshop
Advanced ClearPass WorkshopAdvanced ClearPass Workshop
Advanced ClearPass Workshop
 
Aruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User GuideAruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User Guide
 
Getting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewallGetting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewall
 
Adapting to evolving user, security, and business needs with aruba clear pass
Adapting to evolving user, security, and business needs with aruba clear passAdapting to evolving user, security, and business needs with aruba clear pass
Adapting to evolving user, security, and business needs with aruba clear pass
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
 
ClearPass Policy Model - An Introduction
ClearPass Policy Model - An IntroductionClearPass Policy Model - An Introduction
ClearPass Policy Model - An Introduction
 
Aruba wireless and clear pass 6 integration guide v1.3
Aruba wireless and clear pass 6 integration guide v1.3Aruba wireless and clear pass 6 integration guide v1.3
Aruba wireless and clear pass 6 integration guide v1.3
 
Aruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPassAruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPass
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
 
Advanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter laneAdvanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter lane
 
Campus Network Design version 8
Campus Network Design version 8Campus Network Design version 8
Campus Network Design version 8
 
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
 
EMEA Airheads- Aruba IAP Webinar – How AirGroup service works in Aruba Instan...
EMEA Airheads- Aruba IAP Webinar – How AirGroup service works in Aruba Instan...EMEA Airheads- Aruba IAP Webinar – How AirGroup service works in Aruba Instan...
EMEA Airheads- Aruba IAP Webinar – How AirGroup service works in Aruba Instan...
 
Useful cli commands v1
Useful cli commands v1Useful cli commands v1
Useful cli commands v1
 
EMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issuesEMEA Airheads- Troubleshooting 802.1x issues
EMEA Airheads- Troubleshooting 802.1x issues
 
EMEA Airheads- Instant AP- Instant AP Best Practice Configuration
EMEA Airheads- Instant AP- Instant AP Best Practice ConfigurationEMEA Airheads- Instant AP- Instant AP Best Practice Configuration
EMEA Airheads- Instant AP- Instant AP Best Practice Configuration
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
 

Viewers also liked

Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Aruba, a Hewlett Packard Enterprise company
 
Extending mobility to remote networks with aruba instant, remote APs, and clo...
Extending mobility to remote networks with aruba instant, remote APs, and clo...Extending mobility to remote networks with aruba instant, remote APs, and clo...
Extending mobility to remote networks with aruba instant, remote APs, and clo...Aruba, a Hewlett Packard Enterprise company
 
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...Aruba, a Hewlett Packard Enterprise company
 
Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...Aruba, a Hewlett Packard Enterprise company
 
Integrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access NetworkIntegrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access NetworkAruba, a Hewlett Packard Enterprise company
 
Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...Aruba, a Hewlett Packard Enterprise company
 
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...Aruba, a Hewlett Packard Enterprise company
 

Viewers also liked (20)

Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
 
Take a Walk on the Wired Side
Take a Walk on the Wired SideTake a Walk on the Wired Side
Take a Walk on the Wired Side
 
Multi-Vendor Access Network Management with Aruba Airwave
Multi-Vendor Access Network Management with Aruba AirwaveMulti-Vendor Access Network Management with Aruba Airwave
Multi-Vendor Access Network Management with Aruba Airwave
 
Extending mobility to remote networks with aruba instant, remote APs, and clo...
Extending mobility to remote networks with aruba instant, remote APs, and clo...Extending mobility to remote networks with aruba instant, remote APs, and clo...
Extending mobility to remote networks with aruba instant, remote APs, and clo...
 
Wireless LAN Security Fundamentals
Wireless LAN Security FundamentalsWireless LAN Security Fundamentals
Wireless LAN Security Fundamentals
 
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment BasicsVery High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
 
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig PortsOverview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
 
Securing the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access networkSecuring the LAN Best practices to secure the wired access network
Securing the LAN Best practices to secure the wired access network
 
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
 
Data center network reference architecture with hpe flex fabric
Data center network reference architecture with hpe flex fabricData center network reference architecture with hpe flex fabric
Data center network reference architecture with hpe flex fabric
 
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
EMEA Airheads- ArubaOS - Rogue AP troubleshootingEMEA Airheads- ArubaOS - Rogue AP troubleshooting
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
 
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
 
Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...
 
Integrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access NetworkIntegrating Unified Communications and Collaboration on an Aruba Access Network
Integrating Unified Communications and Collaboration on an Aruba Access Network
 
Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...
 
Deep visibility to secure network access with aruba ClearPass Insight
Deep visibility to secure network access with aruba ClearPass InsightDeep visibility to secure network access with aruba ClearPass Insight
Deep visibility to secure network access with aruba ClearPass Insight
 
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...
Software defined networking (sdn) deep dive 3rd-party ecosystem apps and the ...
 
Network management with Aruba AirWave
Network management with Aruba AirWaveNetwork management with Aruba AirWave
Network management with Aruba AirWave
 
Anatomy of an AP
Anatomy of an APAnatomy of an AP
Anatomy of an AP
 
Working with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based servicesWorking with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based services
 

Similar to Aruba ClearPass Exchange Deep Dive

Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionAustina Francis
 
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...Amazon Web Services
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesSherry Bailey
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareCloudflare
 
HTTP Authorization using OPA
HTTP Authorization using OPAHTTP Authorization using OPA
HTTP Authorization using OPAKnoldus Inc.
 
1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architectureCloud Genius
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...apidays
 
Remote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageRemote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageIJMER
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureQualys
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudCryptzone
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive PortalWavecrest Computing
 
Blockchain and IAM for IOT Edge Authentication
Blockchain and IAM for IOT Edge AuthenticationBlockchain and IAM for IOT Edge Authentication
Blockchain and IAM for IOT Edge Authenticationdsapps
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisationanupriti
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Modeltom termini
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 

Similar to Aruba ClearPass Exchange Deep Dive (20)

Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
 
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay Examples
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
HTTP Authorization using OPA
HTTP Authorization using OPAHTTP Authorization using OPA
HTTP Authorization using OPA
 
1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture1. introduction to_cloud_services_architecture
1. introduction to_cloud_services_architecture
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
 
Remote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageRemote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud Storage
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the Cloud
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
 
Taw opening session
Taw opening sessionTaw opening session
Taw opening session
 
Blockchain and IAM for IOT Edge Authentication
Blockchain and IAM for IOT Edge AuthenticationBlockchain and IAM for IOT Edge Authentication
Blockchain and IAM for IOT Edge Authentication
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisation
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Model
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 

More from Aruba, a Hewlett Packard Enterprise company

More from Aruba, a Hewlett Packard Enterprise company (20)

Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba CentralEMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba Central
 
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS SwitchEMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS Switch
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 
Introduction to AirWave 10
Introduction to AirWave 10Introduction to AirWave 10
Introduction to AirWave 10
 
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS SwitchEMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
 
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.xEMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
 
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads-  Getting Started with the ClearPass REST API – CPPMEMEA Airheads-  Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
 
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.xEMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
 
Airheads Meetups: 8400 Presentation
Airheads Meetups: 8400 PresentationAirheads Meetups: 8400 Presentation
Airheads Meetups: 8400 Presentation
 
Airheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau PresentationAirheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau Presentation
 
Airheads Meetups- High density WLAN
Airheads Meetups- High density WLANAirheads Meetups- High density WLAN
Airheads Meetups- High density WLAN
 
Airheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes ArubaAirheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes Aruba
 
EMEA Airheads - Configuring different APIs in Aruba 8.x
EMEA Airheads - Configuring different APIs  in Aruba 8.x EMEA Airheads - Configuring different APIs  in Aruba 8.x
EMEA Airheads - Configuring different APIs in Aruba 8.x
 
EMEA Airheads - Aruba Remote Access Point (RAP) Troubleshooting
EMEA Airheads - Aruba Remote Access Point (RAP) TroubleshootingEMEA Airheads - Aruba Remote Access Point (RAP) Troubleshooting
EMEA Airheads - Aruba Remote Access Point (RAP) Troubleshooting
 
EMEA Airheads - Multi zone ap and centralized image upgrade
EMEA Airheads - Multi zone ap and centralized image upgradeEMEA Airheads - Multi zone ap and centralized image upgrade
EMEA Airheads - Multi zone ap and centralized image upgrade
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Aruba ClearPass Exchange Deep Dive

  • 1. #ATM16 ClearPass Exchange Gary Jenkins / Abhijit Das - CSE @ArubaNetworks |
  • 2. 2 What is ClearPass Exchange? It is a partner ecosystem based on API’s and Syslog messaging that allows customers to share context between ClearPass, MDM/EMM, Firewalls, Wi-Fi equipment, Wired switches, VPN concentrators and other solutions (SIEM, PMS, Trouble-ticket, etc.).
  • 3. 3 • Included in Base License • Integrates with virtually any web based application • Allows customers to build their own integrations • Recipes available on Airheads Community • Built-in native integration (over 65 and counting) • Build-your-own integrations utilizing HTTP RESTful APIs
  • 4. 4 Examples of 3rd party integrations
  • 5. 5 How does the Exchange process work?
  • 6. 6 Palo Alto Networks Firewall example
  • 8. 8 How did ClearPass communicate with Twilio?
  • 12. 12 How did we get the visitor’s phone #?
  • 13. 13 From the Guest database!
  • 14. 14 When do the 3rd party applications update?
  • 15. 15 It happens in post-authentication
  • 16. 16#ATM16 Enforcement Points [Firewalls] PANW, CheckPoint, FortiNet, Intel MLC, Juniper SRX, iboss @ArubaNetworks |
  • 17. 17#ATM16@ArubaNetworks | Enforcement RADIUS REQUEST Service Matching Authentication Authorization Role Mapping RADIUS RESPONSE HTTP ENFORCEMENT RADIUS Accounting Target: Checkpoint, Fortinet, Websense, others
  • 18. 18#ATM16@ArubaNetworks | Firewall Integration – Today’s challenge is to allow traffic based upon contextual data such as username – Session Notification Enforcement - is introduced in 6.5.0. Notification of a change in IP address can now be sent to any external context server (such as a firewall) by configuring that server as a generic HTTP server and adding the appropriate generic HTTP context server actions. The content of the payload to be posted by CPPM to the external server is based on the REST API defined by the external server for communication.
  • 19. 19#ATM16@ArubaNetworks | What ClearPass sees that it can send to the firewall – When a user authenticates to the wireless or wired network using ClearPass we gather information about the user. • Username • AD information • Domain • IP address and MAC • Location • Device Type • Device OS Internet Internal Segment (include Staff, Student, Teacher, etc) Existing Firewall Next Gen Firewall ClearPass MS AD • V-wire inline mode • Monitoring Internet segment • Provides application visibility • Enabled Threat Prevention , URL filtering , Wildfire • User-ID feature • Standalone mode • Integrated with Firewall • Authentication Users (Students) • 802.1x Authentication for Wi-FI User Controller + AP LAN Switch
  • 20. 20#ATM16@ArubaNetworks | Event Network Diagram Flow Internet Internal Segment (include Staff, Student, Teacher, etc) Next Gen Firewall ClearPass MS AD Controller + AP LAN Switch If a device breaks one of the firewall rules it can signal ClearPass that will signal back to the wired or wireless network to move the device to a quarantine network. It can also send a text to them via twilio and open a helpdesk ticket
  • 21. 21#ATM16 Mobile Client Enforcement [MDM] MobileIron, AirWatch, BES, JAMF, Etc., Google Admin Console @ArubaNetworks |
  • 22. 22#ATM16@ArubaNetworks | MDM Integration – Google Admin Console – Create account on External Server • Client ID and Client Secret Manufacturer, Model – Model, OS version, Serial Number Owner – Display Name Ownership – Corporate, Personal MDM Identifier – MDM Enabled Security Status – Compromised, Blacklist or Required App Encryption enabled, Last Check-in
  • 24. 24#ATM16@ArubaNetworks | ClearPass Splunk App A rich set of dashboards to visualize and navigate the wealth of information captured by ClearPass.
  • 25. 25#ATM16@ArubaNetworks | ClearPass Splunk App – Customer Example “I had to apply a new radius cert, and for all of the corporate devices (windows and mobile) we have ways to whitelist the radius server certificate in advance, but personal IOS devices detected a cert change and wouldn’t connect until a user drills into their wifi settings and accept the new cert. Before doing that it just aborts the authentication attempt as soon as it see the radius server cert doesn’t match what it has cached, which just shows as a timeout in ClearPass. The trend graph using Splunk gave a pretty cool visual of what happened when I made that change, and how it diminished as people figured out they weren’t connecting, drilled in, and accepted the cert. Blue arrow is when I made the change.”
  • 27. 27 What about talking to ClearPass from another application?
  • 28. 28 We use the RESTful APIs.
  • 30. 30 So, how do we know how to use the APIs?
  • 31. 31 You can actually try it out in the browser itself by using the API explorer.
  • 32. 32 The API explorer shows you all the functions that are available:
  • 33. 33 Let’s take a look at the Guest method under Guest Manager
  • 34. 34 Under Guest, we can list/add/get/update/replace and delete guests
  • 35. 35 Before we take a look at the list function, how do we authorize the API call?
  • 36. 36 Let’s take a look at how to use the list
  • 38. 38 Response code and headers of the call:
  • 39. 39 How to use it in a script?
  • 40. 40 What’s coming up next in Exchange?
  • 41. 41 Join Aruba’s Titans of Tomorrow force in the fight against network mayhem. Find out what your IT superpower is. Share your results with friends and receive a free superpower t-shirt. www.arubatitans.com

Editor's Notes

  1. Exchange is process by which CPPM can get data from other applications as well as send data. More formally, it’s a partner eco system.
  2. Notice that here we are using HTTPS to connect to Twilio to get data back. Unlike the previous PAN example where we use an API, here we simply make a HTTPS call.
  3. Keep in mind that we are using HTTPS and not an inbuilt API.
  4. Notice that here we are using HTTPS to connect to Twilio to get data back. Unlike the previous PAN example where we use an API, here we simply make a HTTPS call.
  5. Notice that here we are using HTTPS to connect to Twilio to get data back. Unlike the previous PAN example where we use an API, here we simply make a HTTPS call.
  6. Notice that here we are using HTTPS to connect to Twilio to get data back. Unlike the previous PAN example where we use an API, here we simply make a HTTPS call.
  7. Notice that here we are using HTTPS to connect to Twilio to get data back. Unlike the previous PAN example where we use an API, here we simply make a HTTPS call.
  8. Notice that here we are using HTTPS to connect to Twilio to get data back. Unlike the previous PAN example where we use an API, here we simply make a HTTPS call.
  9. Notice that here we are using HTTPS to connect to Twilio to get data back. Unlike the previous PAN example where we use an API, here we simply make a HTTPS call.
  10. Notice that here we are using HTTPS to connect to Twilio to get data back. Unlike the previous PAN example where we use an API, here we simply make a HTTPS call. From what we talked about in the previous slides, we got the guest’s phone number. So, we can take action only after the guest has entered their details.
  11. Historically we've received a RADIUS request and responded to the NAD which sent it. We all get that. That's tablesteaks. But, there is a finite set of enterprise devices which speak RADIUS. On the other hand, there's an infinite number of devices and cloud services which speak a RESTful HTTP API. (Think Internet of Things). I call that HTTP-based Enforcement. CPPM now supports HTTP-based enforcement in a flexible framework. Its not just RADIUS requests anymore. ClearPass can now receive a syslog message and process it; just like a RADIUS or TACACS request.
  12. Session Notification Enforcement - is introduced in 6.5.0. Notification of a change in IP address can now be sent to any external context server (such as a firewall) by configuring that server as a generic HTTP server and adding the appropriate generic HTTP context server actions. The content of the payload to be posted by CPPM to the external server is based on the REST API defined by the external server for communication.
  13. Here you can see that we have different grant types and profiles. These profiles have different levels of permissions.
  14. Here you can see that the “QuickAccess API Rights” profile has read-write access to all the Guest services and read-only for viewing passwords. An important item to note here is that this profile also has API access. Similarly, the “API tester” only has read access across different services.
  15. Recall that we setup the Client IDs with the appropriate profiles. We now have to provide a token with which we can access the API.
  16. Here we are providing a wildcard filter and the return html will be on JSON format. Notice that we are limiting the results to 25 here.
  17. Remember to zoom in with “+”
  18. Recall that we show you what the response codes actually mean.
  19. We use “curl” with the appropriate header with the authorized token.
  20. Syslog ingestor Additional APIs
  21. Contest Overview - Aruba is running a marketing campaign where we ask “What is your IT superpower?” - Go to arubatitans.com to take a quick quiz to discover your superpower. - Share your results with friends and encourage others to play the game - Once you share, go to the Social and Community Hub, Gracia Commons, 3rd fl to pick up your free superpower shirt. FAQ 1. What do I have to do to get a shirt? Share your IT superpower results with friends and encourage them to play the game. Then come to the Social & Community Hub, 3rd Floor Gracia Commons to pick up your shirt. We just need your name and badge for verification. 2. Where do I get my shirt? Come to the #ATM16 Social & Community hub located at Gracia Commons on the 3rd Floor 3. Do I have to be at the event to get the shirt? Yes. You have to be at #ATM16 to get a shirt. 4. Can I get my colleague a shirt? He/she is in a session right now. Unfortunately not. We encourage your colleague to participate so that they can win a shirt for themselves. 5. Can I bring a shirt home for my colleague? Unfortunately not. You have to be at #ATM16 to get a shirt. 6. You don’t have a shirt in my size, can you ship the right size to me later? Unfortunately not. Please select the best size from our inventory on site.