ºÚÁϺ£½Ç91Èë¿Ú's cloud-based RADIUS service extends your organization's user ºÚÁϺ£½Ç91Èë¿Ú credentials to your WiFi and other resources that support the RADIUS protocol. This document will give details on the different options and combinations available for various RADIUS protocols, along with the technical considerations admins need to keep in mind.
RADIUS Client Public IP Considerations
- Your public IP can only be used one time in ºÚÁϺ£½Ç91Èë¿Ú.
Only public IPv4 is supported. IPv6 is not supported.
If your public IP Address is dynamic and not statically assigned by your ISP, you will need to update the RADIUS configuration within ºÚÁϺ£½Ç91Èë¿Ú to reflect the newly assigned IP Address. You may change this either within the Admin Portal or via the API .
Authentication Protocols Supported by ºÚÁϺ£½Ç91Èë¿Ú
- Mutual TLS (mTLS)
- EAP-TLS
- TLS encryption
- PEAPv0 (MSCHAPv2-based)
- EAP-TTLS/PAP
- Shared key encryption:
- EAP-MSCHAPv2
- MSCHAPv2
- PAP*
- PAP encryption is weak; ºÚÁϺ£½Ç91Èë¿Ú strongly recommends using protocols other than PAP.
- Mac and iOS devices require additional configuration to use EAP-TTLS/PAP authentication for wireless clients.
All protocols are always available. The user or admin will configure the device to select a single protocol during the authentication attempts being made to the network. That decision should be based on the desired Multi-Factor Authentication (MFA) or primary Identity Provider (IdP) to be used.
Protocol Support for ºÚÁϺ£½Ç91Èë¿Ú MFA:
Protocol | Method |
---|---|
PEAPv0 | Push |
EAP with TTLS/PAP | TOTP/Push |
EAP-MSCHAPv2 | Push |
MSCHAPv2 | Push |
PAP | TOTP/Push |
EAP-TLS | None |
MFA methods:
- TOTP: uses an authenticator App (like ºÚÁϺ£½Ç91Èë¿Ú Protect, Microsoft Authenticator, or Google Authenticator) to generate 6-digit codes
- Push: uses ºÚÁϺ£½Ç91Èë¿Ú Protect in-App push notifications
- We recommend turning on MFA for Radius for VPN. We don’t currently recommend that you enable RADIUS TOTP MFA on your wireless network servers, however ºÚÁϺ£½Ç91Èë¿Ú Protect Mobile Push can be used on RADIUS VPN servers and wireless network RADIUS servers.
See: ºÚÁϺ£½Ç91Èë¿Ú MFA Guide.
Entra ID Delegated Authentication
- For organizations planning to use Entra ID as their IdP, they need to import those users into ºÚÁϺ£½Ç91Èë¿Ú and assign them to a User Group that has access to the RADIUS server.
- When authenticating with Entra ID, the UPN in Entra ID should match the company email address in ºÚÁϺ£½Ç91Èë¿Ú and the user should be using this attribute for their Radius login.
Protocol Support for Entra ID Delegated Authentication:
Protocol | MFA |
---|---|
EAP with TTLS/PAP | None |
PAP | None |
MFA is not supported when authenticating through an IdP other than ºÚÁϺ£½Ç91Èë¿Ú, such as Entra ID.