XYGATE User Authentication Reference Manual

XYGATE
®
User Authentication
Reference Manual
Contents
XYPRO Technology Corporation viii Proprietary and Confidential
14.2 RADIUS-Related UACONF Keywords ...........................................111
14.3 Prepare the NonStop System for RADIUS Authentication ..................112
14.3.1 Checking for Network-Related Configuration ...................112
14.3.2 Network Configuration Files That Need Checking ..............113
14.3.3 Telserv Process Configuration Checking .........................115
14.3.4 Testing Network-Related System Configuration ................118
14.4 Considerations for RADIUS Configuration ....................................119
14.5 Running the RADIUS Install Macro.............................................121
14.6 RADIUS-Related UAGroup (UAACL) Keywords ...............................123
14.7 Designing the User Schema and ID Mapping in the UAACL File ...........123
14.8 Testing the RADIUS Interface and User Mapping............................124
14.9 Troubleshooting the XUA and RADIUS Server................................126
Chapter 15. Mapping NonStop IDs to Alternative Authentication Databases .............. 129
15.1 Using Regular Expressions to Match the Userids ............................130
15.2 Using Mapping Operators .......................................................130
15.2.1 APPEND Operator ...................................................131
15.2.2 DELETE Operator ....................................................131
15.2.3 DOWNSHIFT Operator ..............................................132
15.2.4 UPSHIFT Operator ...................................................132
15.2.5 EXIT Operator .......................................................133
15.2.6 INSERT Operator ....................................................133
15.2.7 REPLACE Operator ..................................................134
15.3 Testing the Userid Mapping ....................................................134
Chapter 16. What-if Testing ........................................................................ 137
16.1 Testing Logon Outcome Based on Target Userid ...........................138
16.2 Testing Logon Outcome Based on Subject Userid ..........................139
16.3 Testing Logon Outcome Based on Requestor Program .....................139
16.4 Testing Logon Outcome Based on Ancestor Program ......................140
16.5 Testing Logon Outcome Based on Port .......................................140
16.6 Testing the Impersonation Logon .............................................141
16.7 How to Predict a Result and UAGROUP ......................................142
16.8 Testing Logon Outcome Based on Time ......................................143
16.9 Testing the LDAP Interface ....................................................148
1
6.10 Testing the RSA Interface ......................................................150
16.11 Testing the RADIUS Interface ..................................................152