When HACA authentication and authorization are used, the authentication and authorization information must be configured on the HACA server.
When a user requests to access the Internet, the access device forwards authentication information to the HACA server. The HACA server then decides whether to allow the user to pass based on the configured information. If the user is allowed, the HACA server sends an access-accept message carrying authorization information to the access device. The access device then authorizes network access rights to the user according to the access-accept message.