SIP digest authentication settings
Use this page to configure Session Initiation Protocol (SIP) digest authentication settings; these settings allow the SIP container to authenticate secured applications.
To view this administrative console page, click
.Enable digest authentication integrity
Specifies the authentication integrity (auth-int) quality of protection (QOP) for digest authentication. Digest authentication defines two types of QOP: auth and auth-int. By default, basic authentication (auth) is used. If the value is set to True, the auth-int QOP is used, which is the highest level of protection.
Information | Value |
---|---|
Data type | Boolean |
Default | True |
Enable SIP basic authentication
Specifies the SIP container supports basic authentication. If the value is set to True, requests that have the Authorization header with basic schema are authenticated by the application server. Otherwise, digest authentication is required.
Information | Value |
---|---|
Data type | Boolean |
Default | False |
Enable multiple use of nonce
Specifies whether to enable multiple uses of the same nonce. If you use the same nonce more than once, then less system resources are required, however, your system is not as secure.
Information | Value |
---|---|
Data type | Boolean |
Default | False |
Limit nonce maximum age
Specifies whether to enable the nonce maximum age. If you do not disable this parameter, the nonce never expires.
Information | Value |
---|---|
Data type | Boolean |
Default | True |
Nonce maximum age
Specifies the amount of time, in milliseconds, for which a nonce is valid. If the value is set to 1, the amount of time is considered to be infinite.
Information | Value |
---|---|
Data type | Integer |
Default | 1 |
LDAP cache clean intervals
Specifies the amount of time that must expire, in minutes, before the LDAP cache is cleaned.
Information | Value |
---|---|
Data type | Integer |
Default | 120 |
LDAP password attribute name
Specifies the LDAP attribute name that stores the user password .
Information | Value |
---|---|
Data type | String |
Default | Empty string |
User cache clean intervals
Specifies the amount of time that must expire, in minutes, before the security subject cache is cleaned.
Information | Value |
---|---|
Data type | Integer |
Default | 15 |
Digest password server class
Specifies the Java class name that implements the PasswordServer interface.
Information | Value |
---|---|
Data type | String |
Default | Empty string |
Hashed credentials
Specifies the name of the LDAP field that contains the hashed credentials. If a value is specified for this setting, then this setting overrides the pws_atr_name setting.
LDAP servers automatically provide password support. Unless you enable the LDAP server to use hashed values, the LDAP server stores user passwords and then the request processing component uses these passwords to validate a request. Because this method of authentication exposes user passwords to potential internet theft, you should enable the use of hashed credentials to authenticate a request.
- The LDAP attribute must store a byte value or a string value. Other attribute types are not supported.
- All of your applications must share the same realm, or you must define a different attribute for each realm.
- The hash function might be different than MD5. In this situation, the SIP container sends a algorithm that is different from the calculated value for the attribute. When this situation occurs, user authentication might fail even if the user provided the proper credentials.
- Hashedcredentials=value, where value is the name of LDAP attribute that stores the hash value for user, password, and realm.
- Hashedrealm=value, where value is the realm, on which the hashed value is calculated.
Information | Value |
---|---|
Data type | String |
Default | Empty string |
Hashed realm
Specifies the realm for hashed credentials, if the hashed credentials setting is enabled.
Information | Value |
---|---|
Data type | String |
Default | Empty string |