摘要 |
In a method for controlling network access, identity information for authentication is received from a communications device in a network. When the identity information indicates an identity module, the identity module is authentication. The identity module relates to the communications device, and it is associated with a further network. In response to a successful authentication of the identity module, access is granted to the communications device to a set of services of the further network. When the identity information indicates the communications device, the communications device is authenticated. In response to a successful authentication of the communications device, access is granted to the communications device to a subset of the set of services of the further network.
|