Triple key authentication is a method of authenticating users based on their username, password, and location after ISG redirects
them to the Cisco Service Management Engine (SME) portal. The SME server provides the location based on the source IP address
of the subscriber being authenticated. Before the Triple Key Authentication Support feature was introduced, users were authenticated
only on the basis of the username and password (two-key authentication). The Triple Key Authentication Support feature also
eases migration from Service Selection Gateway (SSG) to an ISG platform because SSG uses triple key authentication.
For SSG, the Cisco Subscriber Edge Services Manager (SESM) server populates RADIUS attribute 31 (calling-station ID) in the
user-login request that it sends to the SSG with a string containing the subscriber’s location. The SSG then includes this
location string in the access-request message that it sends to the RADIUS server where the login is authenticated based on
the username, password, and location string.
With ISG triple key authentication, the ISG sends the location string within a Cisco vendor-specific attribute (VSA) that
is included in the access-request message to the RADIUS server.
The location information is received from SME as Cisco VSA 250. This location information is included in session authentication
requests, session accounting requests from the ISG, and prepaid authorization requests.
The table below shows the Cisco vendor-specific non-AVPair attribute used for triple key authentication.
Table 1. Cisco Vendor-Specific Non-AVPair Attribute
Sub-AttrID
|
Attribute Type
|
Value
|
Function
|
Example
|
Used in
|
250
|
account-info
|
L<location- string>
|
Third key in triple key authentication
|
LWiFiHotSpot001
|
Acc-Req CoA Req Accounting
|