External Authentication Using RADIUS (via apache httpd)
Follow the typical steps to configure External Authentication Using RADIUS as before and modify the pld.conf. Add the below configuration changes in section '<LocationMatch "^/me/':
...
<LocationMatch "^/me/(?!(proxy/|c/|r/|scripts/|/help/|logout\.html)).*$">
AuthName "OCSM COM"
AuthType basic
AuthXRadiusAddServer "RADIUS_IP:RADIUS_PORT" "RADIUS_SHARED_SECRET"
AuthXRadiusTimeout 5
AuthXRadiusRetries 3
AuthBasicProvider xradius
Require valid-user
RewriteEngine On
RewriteCond %{SERVER_PORT} 443
RewriteCond %{LA-U:REMOTE_USER} (.+)
RewriteRule .* - [E=RU:%1,L]
RequestHeader unset X-Forwarded-User
RequestHeader set X-Forwarded-User %{RU}e
ProxyPassMatch balancer://mycluster
ProxyPassReverse balancer://mycluster
</LocationMatch>
....Replace AuthXRadiusAddServer line as below:
AuthXRadiusAddServer "127.0.0.1:1812" "radsec"Table 6-4 AuthXRadiusAddServer
| Entry | Value | Remarks |
|---|---|---|
| RADIUS_IP | 127.0.0.1 | Hostname should be local host to internal communication with radsecproxy |
| RADIUS_PORT | 1812 | The UDP port on which the radsecproxy server is listening |
| RADIUS_SHARED_SECRET | radsec | This field must contain the secret that is shared by Operations Monitor and the RADIUS server used for authentication. The recommended and default will be radsec |
| AuthXRadiusTimeout | 5 | Number of seconds to wait response from RADIUS server. |
| AuthXRadiusRetries | 3 | Number of retry attempts if a request to the RADIUS server fails |
For more information on configuring external RADIUS authentication, see the section Configuring Apache for Authenticating with RADIUS Server in the Oracle Communications Session Monitor Installation Guide Release 6.1Installation Guide.