HP-UX AAA Server A.08.01 administrator's guide (T1428-90072, May 2010)

Table Of Contents
Guidelines to Write EAP-SIM and EAP-AKA Fast Re-Authentication Database
AATVs....................................................................................................................252
Fast Re-Authentication Database Update AATV.............................................253
Update AATV Inputs...................................................................................253
Update AATV Outputs................................................................................254
AATV Functionality and Return Events.....................................................254
Fast Re-Authentication Database Lookup AATV.............................................254
Lookup AATV Inputs..................................................................................254
Lookup AATV Outputs...............................................................................255
Lookup AATV Functionality and Return Events........................................256
Pseudonym Identities..................................................................................................256
Random Pseudonyms............................................................................................256
Algorithm-Based Pseudonyms..............................................................................257
Configuring for Pseudonym Identity Support......................................................258
Sample EAP.authfile Configuration for Random Pseudonym Identity
Support.............................................................................................................260
Sample EAP.authfile Configuration for Algorithm-based Pseudonym
Identity Support................................................................................................261
Sample aaa.config Configuration for Algorithm-based Pseudonym Identity
Support.............................................................................................................262
Guidelines to Write EAP-SIM and EAP-AKA Pseudonym Database AATVs.......262
Pseudonym Database Update AATV...............................................................264
Update AATV Inputs...................................................................................264
Update AATV Outputs................................................................................265
AATV Functionality and Return Events.....................................................265
Pseudonym Database Lookup AATV...............................................................265
Lookup AATV Inputs..................................................................................265
Lookup AATV Outputs...............................................................................266
Lookup AATV Functionality and Return Events........................................268
Generating Authentication Vectors Using A3, A8, and AKA Algorithms.................268
3GPP Milenage A3, A8, and AKA Algorithm........................................................269
18 Configuring HP-UX AAA Server for Scalability and High-Availability ....................................273
Overview.....................................................................................................................273
Scalability and High-Availability Concepts................................................................274
Grouping HP-UX AAA Servers.............................................................................274
HP-UX AAA Server Attributes..............................................................................274
HP-UX AAA Server Deployment for Scalability and High-Availability....................274
Managing Multiple HP-UX AAA Servers For Scalability and High-Availability......276
Administering HP-UX AAA Servers Using HP-UX AAA Server Manager..........276
Logging In.........................................................................................................277
Adding a Group................................................................................................278
Modifying a Group...........................................................................................279
Deleting a Group..............................................................................................279
Table of Contents 9