Sure, in this case you need to add user into Radius/LDAP backend and
proceed as normally.
AFAIK there is no "third" solution here, except for "trusted" table.
--
Arek
Voipers Portugal wrote:
Ok. That's the easy solution. However, that
ain't protected againts IP
spoofing problems. Isn't there a way to authenticate using users (with
username and password)? So that, when Asterisk send an INVITE do SER,
Asterisk should be a normal SER user, like any other user. I am using
the following code to see if the invite is trusted or not:
log(1, "INVITE not in table trusted\n");
if (!radius_www_authorize("ser host")) {
log(1, "INVITE not authorized, generating
digest\n");
www_challenge("ser host", "0");
break;
};
log(1, "INVITE authorized\n");
And this way, I think only the users that are in my LDAP database
(contacted via radius) and registred to my ser host can make the calls.
Am I correct?