User Access Manager Help >> Operation Guide >> User Access Policy >> Service Parameters >> System Settings

Roaming Configuration

When the current INC system receives an authentication request from a user who does not belong to it, it needs to forward the authentication request to the UAM to which the user belongs. This is implemented by the roaming function.In the roaming process, the UAMs at both ends need to cooperate, which requires the following configurations (assume that the UAM to be forwarding the authentication request is called the source UAM and that to be receiving the request is called the destination UAM):

Precautions

The following are the detailed configurations.

Functions