Overview
Improve system security posture with advanced authentication measures, ensuring transmission integrity.
Radio authentication provides an additional layer of protection to Safeguard the integrity of communications. Any unauthorized radio without the correct key will be denied access to the system and an alert sent. Internal access is controlled by a centralized authority that defines what functions and operations users can perform, and on which devices. Core infrastructure machine authentication employs protocols and shared key options.
Features and benefits
Authenticate radio communications and devices
Advanced key management
Two-factor authentication (2FA)
Internal identity management
Remote user access controls
Peer-to-Peer router authentication
Administration and policy management
Smart card authentication
Block unauthorized devices and users from system accesss while securing network interoperability.
Radio authentication
Radio Authentication uses a unique authentication key assigned to each radio that is also stored in the authentication center (AuC). The authentication key cannot be read from the radio and then cloned into another device. The correct key must be present in order for the radio to gain access to the ASTRO system. This provides an additional level of control for system owners and prevents unauthorized radios from joining the system.
Encryption key management
Encryption Key Management is critical to the cyber resiliency of the ASTRO system. Our secure management ecosystem ensures your radio communications are secured with encryption keys that can be updated over-the-air. This rekeying option provides the convenience of not having users bring their devices into the shop for manual rekeying.
Centralized authentication
The centralized authority defines what functions and operations users can perform, and on what devices.Centralized Authentication also addresses identity management within the ASTRO network through a centralized user credentials (account and password) database. Records of all logins are centrally stored which enables the customer to manage system access and perform audits.
Core data integrity
ASTRO core transmissions between routers are authenticated by Open Shortest Path First (OSPF) and Border Gateway Protocols (BGP) and by means of shared Secure Shell keys (SSH). SSH protects the integrity of the keys during installation and automated routine scripts, with one shared key per protocol (OSPF and BGP). If customers require unique keys, this may be achieved by manual key configuration on the affected routers.
Cybersecurity resources
ASTRO Systems Authentication Solutions Brochure
Learn how to prevent unauthorized system access, while securing your network