XYGATE User Authentication Reference Manual
XYGATE
®
 User Authentication
™
 Reference Manual    
Contents 
XYPRO Technology Corporation  viii  Proprietary and Confidential 
14.2  RADIUS-Related UACONF Keywords ...........................................111 
14.3  Prepare the NonStop System for RADIUS Authentication ..................112 
14.3.1  Checking for Network-Related Configuration ...................112 
14.3.2  Network Configuration Files That Need Checking ..............113 
14.3.3  Telserv Process Configuration Checking .........................115 
14.3.4  Testing Network-Related System Configuration ................118 
14.4  Considerations for RADIUS Configuration ....................................119 
14.5  Running the RADIUS Install Macro.............................................121 
14.6  RADIUS-Related UAGroup (UAACL) Keywords ...............................123 
14.7  Designing the User Schema and ID Mapping in the UAACL File ...........123 
14.8  Testing the RADIUS Interface and User Mapping............................124 
14.9  Troubleshooting the XUA and RADIUS Server................................126 
Chapter 15.  Mapping NonStop IDs to Alternative Authentication Databases .............. 129 
15.1  Using Regular Expressions to Match the Userids ............................130 
15.2  Using Mapping Operators .......................................................130 
15.2.1  APPEND Operator ...................................................131 
15.2.2  DELETE Operator ....................................................131 
15.2.3  DOWNSHIFT Operator ..............................................132 
15.2.4  UPSHIFT Operator ...................................................132 
15.2.5  EXIT Operator .......................................................133 
15.2.6  INSERT Operator ....................................................133 
15.2.7  REPLACE Operator ..................................................134 
15.3  Testing the Userid Mapping ....................................................134 
Chapter 16.  What-if Testing ........................................................................ 137 
16.1  Testing Logon Outcome Based on Target Userid ...........................138 
16.2  Testing Logon Outcome Based on Subject Userid ..........................139 
16.3  Testing Logon Outcome Based on Requestor Program .....................139 
16.4  Testing Logon Outcome Based on Ancestor Program ......................140 
16.5  Testing Logon Outcome Based on Port .......................................140 
16.6  Testing the Impersonation Logon .............................................141 
16.7  How to Predict a Result and UAGROUP ......................................142 
16.8  Testing Logon Outcome Based on Time ......................................143 
16.9  Testing the LDAP Interface ....................................................148
1
6.10  Testing the RSA Interface ......................................................150 
16.11  Testing the RADIUS Interface ..................................................152 










