Features, Roaming authentication, Application scenarios – H3C Technologies H3C Intelligent Management Center User Manual

Page 28

Advertising
background image

10

Figure 7 Network diagram of RSA authentication

Features

RSA authentication has the following features:

After UAM receives an authentication request from an endpoint user, UAM uses the RADIUS
protocol to forward the request to the RSA server. The RSA server authenticates the user identity.

After the user passes identify authentication, UAM checks the binding information. If the user passes
the check, UAM tells the access device to permit network access, and assigns access control

policies to the access device. The access device then controls user access to the network according

to the policies.

Roaming authentication

Application scenarios

Roaming authentication, as shown in

Figure 8

, is typically used in a large-scale network that has

deployed multiple UAM servers. Each server performs access control in an area, and a user needs to

access the network in different areas.

Advertising