Prateek Gupta wrote: > User A sends the NSIS request with its keyed hash (generated using User > A's key) appended to it to the NSIS server. Now the NSIS server needs to > authenticate that request with a Radius server.
Can you point to a specification saying how this hashing works? > Is there a way to do this i.e. how to generate a AAA message with the > information available i.e. a string, its keyed hash and User A's id ? > Assuming that the Radius server has keys of all legitimate users. Yes. http://www.freeradius.org/freeradius-client/ Alan DeKok. -- http://deployingradius.com - The web site of the book http://deployingradius.com/blog/ - The blog - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html