The Diameter Resource Adaptors package contains all the Metaswitch Rhino resource adaptors that are based on the Diameter protocol.

The supported Diameter applications are the IETF standards for Diameter Accounting and Credit Control, as well as the 3GPP Reference Points Ro, Rf, Sh and Gx.

The Diameter Base resource adaptor can be used to send and receive arbitrary Diameter messages, allowing custom Diameter applications to be implemented.

The package also includes example services that use the resource adaptors, and simulators to run the examples against.

Security Notices

For interface management with Diameter Resource Adaptors, follow these guidelines:

Adhere to principles of Zero Trust.

We recommend that you adhere to principles of Zero Trust while designing, commissioning, and modifying your deployment. Zero Trust includes authenticating and authorizing traffic whenever possible, giving the least amount of access required to sessions and entities, and assuming that a security breach could originate from anywhere. A Zero Trust security model helps mitigate the effect of a breach if a device or network is compromised. For more information on Zero Trust principles, see Zero Trust Model - Modern Security Architecture | Microsoft Security.

This documentation uses Transport Layer Security (TLS) certificates to refer to X.509 certificates used with the TLS protocol. Outside of this product’s documentation, you may see TLS certificates referred to as SSL/TLS certificates or just SSL certificates. These terms are often used interchangeably, even though Secure Sockets Layer (SSL) is a distinct protocol from TLS.

Diameter Resource Adaptors provides full support for protocols such as TLS. For details about supported protocols, see Diameter Resource Adaptors Statement of Compliance. To configure secure connections for Diameter Resource Adaptors, check the instructions in the Configuring Diameter Transport Security section of the Diameter Resource Adaptors Guide.

Establish trust domains and configure security controls on trust boundaries.

You must establish trust domains around your devices and network and configure security controls on the trust boundaries such as firewalls, network security groups, and rate limiting, even when you control the devices on both sides of the boundary.

Replace certificates at least once per year.

We recommend that you replace certificates at least once per year, including removing the old certificates from your system. This is known as rotating certificates. You might need to rotate your certificates more frequently if they expire after less than one year, or if organizational policies require it.

Product Documentation

New features, improvements and bug fixes included in each software release.

Acknowledgements of third party content used in this product.

Diameter Resource Adaptors Guide
Describes the resource adaptor architecture, along with installation, configuration and general usage documentation.

Diameter Simulators Guide
How to use the Diameter simulation tools

Diameter Resource Adaptor Type API
Javadoc for the Diameter Resource Adaptors Type API.

Statement of Compliance
Resource adaptor compliance against supported protocols.

Documentation for other versions of the Diameter Resource Adaptors is also available.