Selecting a backend

The proxy server uses the concept of Authentication, Authorization, and Accounting (AAA). Until now, we have seen how to use a database to only authenticate and authorize users. We can use many different backends such as databases, RADIUS servers, plain text, and log files. Each backend serves a different purpose. The following table compares the most popular choices:







Corruption in a database can lead to billing problems and missing records.


Separation of the billing server.

Reusing the existing RADIUS infrastructure in the VoIP provider.

It is more complex. Dictionary additions and server configurations are sometimes tricky and time-consuming.

The data will end up in ...

Get Building Telephony Systems with OpenSIPS - Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.