Ivan,<br>Hello<br>Thanks for your reply. Sorry if my question is elementary, but this is the last one. What is the difference between creating a customized module to do Authorization/Post-Authentication and using external programs as instances of rlm_exec module to the so-called functionalities?<br>
<br>Kind Regards<br>Ali Majdzadeh Kohbanani<br>