Skip to main content

Subscriber Creation & Identity Mapping

Subscriber Creation & Identity Mapping

Product: i2i Core OSS/BSS
Company: i2i Tech Services Private Limited


Purpose

Subscribers represent the operational endpoint identity consuming a service (credentials + network identifiers). Correct mapping ensures authentication success, accurate accounting, and consistent service state across systems.

Identity Components

  • Authentication identity: username/identifier used by AAA
  • Authorization mapping: which service/plan/profile applies
  • Network identifiers: MAC/VLAN/Circuit/Interface mapping where applicable
  • Status: active/suspended/terminated aligned to lifecycle

Workflow

  1. Open Service → Create Subscriber
  2. Assign identity/credentials per policy
  3. Map subscriber to service entitlement
  4. Validate uniqueness → Save
  5. Perform post-save validation (AAA/provisioning readiness)

Validation & Safety

  • Credentials must be unique within the defined domain/policy scope.
  • Ensure correct plan/profile mapping; wrong mapping causes speed/policy mismatches.
  • Any production credential reset should be auditable and approved.

Troubleshooting Signals

  • Authentication fails → check identity mapping and subscriber status
  • Session starts but wrong policy → check service profile mapping
  • Usage not visible → check accounting correlation and identifiers

Screenshots

Screenshots not yet added.