UIM

The unified identity management (UIM) uses protocols including the RADIUS and Diameter to interwork with network access devices in various networks to control subscriber network access permission and manages authentication, authorization, and charging. This improves subscriber experience and enhances network security.