HP-UX AAA Server A.08.01 administrator's guide (T1428-90072, May 2010)

Table Of Contents
If user-specific plug-in is added for user lookup, the AATV name is replaced with the
plug-in name. The following section describes configuration of HP-UX AAA Server
user, flat file, LDAP directory server and SQL-compliant database for credential lookup
(subscriber key).
The HP-UX AAA Server receives GSM triplets directly when the external storage
(typically an AuC) generates the triplets. An AATV must be written for this. For
information on how to write an AATV, see Chapter 28 (page 446)
NOTE: The xstring field in the realm configuration must not have spaces.
iaaaFile Authentication Type
If the user credentials are available in the flat file, the iaaaFile AATV is used for lookup.
The configuration of a realm, which employs iaaaFile, is followed by a required {}
block. The {} block enables you to configure the following parameters:
Request-Attribute-For-Search
Policy-Pointer
The iaaaFile authfile configuration parameters are described in Table 17–1.
Table 17-1 The iaaaFile authfile Configuration Parameters
DescriptionParameter
Indicates the search attribute to use for a user
lookup. The attribute must be a string-type, such
as string, tag-str, or octets.
Request-Attribute-For-Search
When iaaaFile is used for EAP-SIM, the value of
the Request-Attribute-For-Search parameter
must be Real-Username.
The default value is User-Id.
For information on Policy-Pointer, see
Authorization to Control Sessions and Access to
Services ” (page 44).
Policy-Pointer
NOTE: This parameter is optional.
The following is an example of a iaaaFile configuration for credentials lookup:
eapsimrealm.com -SIM iaaaFile isp
{
Request-Attribute-For-Search Real-Username }
}
The following must is the sample content of the isp.users file:
######################################################################
##
## file: /etc/opt/aaa/isp.users
#######################################################################
123456789000000
230 Configuring EAP-SIM and EAP-AKA Authentication Methods