Popis: |
Today nearly everyone needs strong and reliable access to the Internet. Usually, such access is provided by Internet-providers. They lay lines of communication and hire specialists. This costs money so customers should pay for the access. Accordingly, the provider wants to distinguish between clients who paid for access and those who do not. That is why providers require methods to control access with usage of authentication. Sometimes, one provider gets hardware of another provider under own control. However, there are a lot of different authentication protocols developed. The target of that work is to connect such authentication methods on hardware with providers services, such as user access control panel (billing). The result of the work is development of running software which can control users’ authentication depending on rules applied in billing panel. |