HP-UX AAA Server A.08.01 administrator's guide (T1428-90072, May 2010)

Table Of Contents
1. Configure the realm using the Realms Screen of the Server Manager. Based on the
user profile, configure the realm for the local users file, LDAP, Oracle or MySQL
database using SQL database. For more information on configuring the realm, see
Adding a Realm” (page 105).
2. Configure the proxy target server using the Server Manager and save the
configuration. For more information on configuring proxies, see “Configuring
Proxies” (page 117)
3. If not appended , append the contents of the sample OTP reference implementation
policy files (located in /opt/aaa/examples/config) to the default policy files
(located in /etc/opt/aaa) using the following commands:
# cat /opt/aaa/examples/config/oath-request-ingress.grp >> /etc/opt/aaa/request-ingress.grp
# cat /opt/aaa/examples/config/oath-reply-egress.grp >> /etc/opt/aaa/reply-egress.grp
# cat /opt/aaa/examples/config/oath-proxy-egress.grp >> /etc/opt/aaa/proxy-egress.grp
4. In the /etc/opt/aaa/request-ingress.grp file, replace the <realm> variable
and configure the Otp-ActionId attribute according to the following rules:
Then
If you have
configured...
Replace the <realm> variable in the following syntax with the realm name configured
in Step 1:
if ((count (User-Name) > 0) && (substr (User-Name after "@") = "<realm>"))
{
The realm
for RADIUS
standard
password
authentication
insert Otp-ActionId = 101
exit "ACK"
}
Replace the <realm> variable in the following syntax with the inner realm name
configured in Step 1:
if ((count (User-Name) > 0) && (substr (User-Name after "@") = "<realm>"))
{
Tunneled
realms with
different
inner and
insert Otp-ActionId = 101
outer
exit "ACK"
}
realms for
EAP
authentication
Configuring OTP Authentication on the HP-UX AAA Server 211